Integrating with Okta
Last updated
Last updated
1- Log in to your OKTA platform with admin privileges
2- Navigate to the Applications section and click the "Create App Integration" button.
3- Choose the OIDC (OpenID Connect) option for the sign-in method.
4- Select "Web application" as the application type.
5- In the General Settings, enter "Amove" as the App Integration Name. Refer to the screenshots below for Grant type details.
6- Add the following URIs in the "Sign-In Redirect URIs" section. Refer to the screenshot below for guidance.Add following URIs in the sign-in redirect URIs section. See screenshot below
https://app.amove.io/ssocallback
https://app.amove.io/usercallback
http://localhost:29123
7- In the Assignments section, you can either allow everyone in your organization access to the application or skip this step and assign groups later.
8- After creating the application, you will encounter a screen displaying the Client ID and Client Secret. These credentials will be used to connect your Amove client to OKTA.
9- Under the "Sign-On" section, edit the OpenID Connect ID Token and change the Issuer from "Dynamic" to your OKTA URL.
The OKTA URL will be used to connect your Amove client to the OKTA
10- Navigate to the Okta API Scopes tab and grant the following scope/permission.
okta.users.read.self
okta.groups.read
Okta.users.read
Okta.users.manage
11- In the Assignment section, edit the Admin user that will be used to import users and groups from OKTA. Change the "Assignment Master" from Group to Administrator.
12- Open the Amove.
13- Choose "Account" from the sidebar menu on the left side.
14- Click on Configure button in Okta Box.
15- Enter the Client ID, Client Secret, and OpenID URL to establish a connection with your OKTA.