Setting up authentication with Okta
The following guide will assist you in configuring your application to use Okta for authentication.
Configure a new application in Okta
Log into the Okta admin console with administrative credentials, select
Applications
thenApplications
Click
Add application
, thenCreate app integration
Select
Open ID Connect
as the sign in method and andWeb application
as the application typeEnter
Lithnet Access Manager
or another suitable application name and optionally provide a logoEnsure that
authorization code
is the selected grant typeFor the sign in redirect URI, enter the base URL where your Lithnet Access Manager app is hosted followed by
/auth/
(eghttps://accessmanager.lithnet.local/auth/
)Set the sign out redirect URI to your base URL, and append
/auth/logout
to the end of it (eghttps://accessmanager.lithnet.local/auth/logout
)Assign the appropriate users to the app and save the new app
From the new app page, copy the
client ID
andclient secret
value for use later in the setup processSelect
Directory
from the main menu bar, and selectProfile editor
. Find theLithnet Access Manager
app in the list, and click theProfile
buttonClick
Add attribute
and create a new attribute calledupn
, of data typestring
. Select both theattribute required
andUser personal
check boxesClick the
Mappings
button. Find the UPN value, and map it to the okta attribute that contains the Active Directory UPN (eg aduser.userPrincipalName)
Configure Lithnet Access Manager
Open the Lithnet Access Manager Service configuration tool
Go to the
Authentication
page and selectOpenID Connect
as the authentication providerEnter the URL of your okta tenant in the
Issuer/Authority
fieldEnter the client ID and secret obtained from the Okta setup process
Enable multi-factor authentication
We strongly recommend to modify your application sign-on policy to require multi-factor authentication for the use of this app.
Last updated