Skip to Content

Okta

Available in v1.21.6+
ℹ️

This feature is only available for ScaleOps Cloud users.

Okta Configuration

  1. Create a Web Application: In your Okta Admin Console, go to Applications and click on Create App Integration. Screenshot showing how to list applications in Okta

  2. Select Create App Integration, and create a new Web application with OIDC Sign-in. Screenshot showing how to create a new app integration in Okta

  3. Under Sign-in redirect URIs, add the following URL:

    • https://auth.scaleops.com/login/callback
  4. Allow grant type Refresh token. Screenshot showing how to add a redirect URI in Okta

  5. Save the configuration and note the Client ID, Client Secret and Issuer URL for the ScaleOps configuration. Screenshot showing the client ID and client secret in Okta   Screenshot showing the issuer url in Okta

ScaleOps Configuration

  • In the ScaleOps Cloud dashboard, go to Users > Configure SSO: Configure SSO
  • Select Okta as the provider, and fill the form. Configure SSO
  • Save Configuration

Groups Setup (Optional)

If you need to retrieve both Active Directory groups and Okta-native groups in your OpenID Connect claims, see Okta’s documentation.

This allows you to automatically assign ScaleOps roles based on your existing Okta groups, streamlining user management and permissions.

  1. In the Okta Admin Console, go to Applications > Applications > ScaleOps > Sign On tab, and configure your groups claim (where ScaleOps is the name of the application we created in the first step). Screenshot showing how to assign a role to a group in Okta

  2. In the ScaleOps Cloud dashboard, go to Users > Configure SSO > Okta, and configure the groups claim, by adding the groups claim to the Groups Claim field and the Scopes field. Screenshot showing how to configure the groups claim in ScaleOps

Validation

  • Log out from ScaleOps Cloud Logout
  • Login using Continue with SSO button. Continue with SSO