Setting up authentication with Okta
The following guide will assist you in configuring your application to use Okta for authentication.
Configure a new application in Okta
Log into the Okta admin console with administrative credentials, select
ApplicationsthenApplicationsClick
Add application, thenCreate app integrationSelect
Open ID Connectas the sign in method and andWeb applicationas the application typeEnter
Lithnet Access Manageror another suitable application name and optionally provide a logoEnsure that
authorization codeis the selected grant typeFor the sign in redirect URI, enter the base URL where your Lithnet Access Manager app is hosted followed by
/auth/(eghttps://accessmanager.lithnet.local/auth/)Set the sign out redirect URI to your base URL, and append
/auth/logoutto the end of it (eghttps://accessmanager.lithnet.local/auth/logout)Assign the appropriate users to the app and save the new app
From the new app page, copy the
client IDandclient secretvalue for use later in the setup processSelect
Directoryfrom the main menu bar, and selectProfile editor. Find theLithnet Access Managerapp in the list, and click theProfilebuttonClick
Add attributeand create a new attribute calledupn, of data typestring. Select both theattribute requiredandUser personalcheck boxesClick the
Mappingsbutton. Find the UPN value, and map it to the okta attribute that contains the Active Directory UPN (eg aduser.userPrincipalName)
Configure Lithnet Access Manager
Open the Lithnet Access Manager Service configuration tool
Go to the
Authenticationpage and selectOpenID Connectas the authentication providerEnter the URL of your okta tenant in the
Issuer/AuthorityfieldEnter the client ID and secret obtained from the Okta setup process

Enable multi-factor authentication
We strongly recommend to modify your application sign-on policy to require multi-factor authentication for the use of this app.
Last updated
Was this helpful?