Skip to Content

Okta

Authentication Setup

Okta Configuration

  1. Navigate to applications in your Okta dashboard. Screenshot showing how to list applications in Okta

  2. Select Create App Integration, and create a new Web application with OIDC Sign-in. Screenshot showing how to create a new app integration in Okta

  3. Under Sign-in redirect URIs, add the following URLs:

    • For ingress setup: https://<YOUR-SCALEOPS-DASHBOARD-URL>/auth/callback
    • For port forwarding without ingress: http://localhost:8080/auth/callback
  4. Allow grant type Refresh token. Screenshot showing how to add a redirect URI in Okta

  5. Save the configuration and note the Client ID, Client Secret and Issuer URL for the ScaleOps configuration. Screenshot showing the client ID and client secret in Okta   Screenshot showing the issuer url in Okta

ScaleOps Configuration

Add the following helm values to your helm values.yml file:

authProvider: provider: okta okta: clientID: <CLIENT-ID> issuerUrl: <ISSUER-URL> clientSecret: <CLIENT-SECRET>

PKCE Setup (Optional)
Available in v1.24.3+

Okta Configuration

Under “General” tab, “Client Credentials” section, check the Require PKCE as additional verification checkbox. Screenshot showing how to enable PKCE in Okta

ScaleOps Configuration

Enable PKCE in ScaleOps by adding the following helm values to your helm values.yml file:

authProvider: provider: okta okta: pkce: enabled: true clientID: <CLIENT-ID> issuerUrl: <ISSUER-URL> clientSecret: <CLIENT-SECRET> groupsClaim: <JWT-CLAIM-NAME-TO-USE>

Groups Setup (Optional)

Okta Configuration

If you need to retrieve both Active Directory groups and Okta-native groups in your OpenID Connect claims, see Okta’s documentation.

Define a group in your Okta integration.

  • Assign a role to this group.
  • ScaleOps determines the group based on the claims in your JWT access token. Screenshot showing how to assign a role to a group in Okta

ScaleOps Configuration

Add the following helm values to your helm values.yml file:

authProvider: provider: okta authorization: enabled: true okta: clientID: <CLIENT-ID> issuerUrl: <ISSUER-URL> clientSecret: <CLIENT-SECRET> groupsClaim: <JWT-CLAIM-NAME-TO-USE>