Setting up authentication with Okta
The following guide will assist you in configuring your application to use Okta for authentication.
Configure a new application in Okta
- Log into the Okta admin console with administrative credentials, select - Applicationsthen- Applications
- Click - Add application, then- Create app integration
- Select - Open ID Connectas the sign in method and and- Web applicationas the application type
- Enter - Lithnet Access Manageror another suitable application name and optionally provide a logo
- Ensure that - authorization codeis the selected grant type
- For the sign in redirect URI, enter the base URL where your Lithnet Access Manager app is hosted followed by - /auth/(eg- https://accessmanager.lithnet.local/auth/)
- Set the sign out redirect URI to your base URL, and append - /auth/logoutto the end of it (eg- https://accessmanager.lithnet.local/auth/logout)
- Assign the appropriate users to the app and save the new app 
- From the new app page, copy the - client IDand- client secretvalue for use later in the setup process
- Select - Directoryfrom the main menu bar, and select- Profile editor. Find the- Lithnet Access Managerapp in the list, and click the- Profilebutton
- Click - Add attributeand create a new attribute called- upn, of data type- string. Select both the- attribute requiredand- User personalcheck boxes
- Click the - Mappingsbutton. Find the UPN value, and map it to the okta attribute that contains the Active Directory UPN (eg aduser.userPrincipalName)
Configure Lithnet Access Manager
- Open the Lithnet Access Manager Service configuration tool 
- Go to the - Authenticationpage and select- OpenID Connectas the authentication provider
- Enter the URL of your okta tenant in the - Issuer/Authorityfield
- Enter the client ID and secret obtained from the Okta setup process 

Enable multi-factor authentication
We strongly recommend to modify your application sign-on policy to require multi-factor authentication for the use of this app.
Last updated
Was this helpful?
