Amove Documentation
  • Getting Started
    • How to Create an Amove Account
    • How to Recover or Reset Password
  • Dashboard
    • Amove Dashboard: Overview
  • Accounts
    • How to Add a Cloud Account
    • How to View & Delete Your Active Cloud Accounts
  • Amove Storage
    • Provisioning Amove Storage
    • Dashboard Overview
    • Managing Regions
    • Create a Bucket
    • Managing Buckets
      • Creating a Bucket
      • Bucket Options
      • Deleting a Bucket
      • Browsing Files
    • Access Key Management
      • Creating an Access Key
      • Managing and Deleting an Access Key
  • Drive
    • How to Setup a Drive
    • How to View & Manage Your Active Drives
  • Backup
    • How to Setup a Backup Instance
    • How to View & Manage Your Active Backup Instances
  • Amove Single Sign-On
    • Integrating with Azure Entra ID (AD)
    • Integrating with Okta
    • Integrating with SAML
  • Cloudflyer (C2C Migration)
    • Using Cloudflyer
    • Transfer Status Report
  • Files
    • How to View Objects from Your Amove Account
  • Admin
    • Users
    • Teams
    • Projects
    • Drives
  • Activity
    • How to View Your Activities Report
  • Uninstall & Reinstall
    • Amove uninstall and reinstall windows
    • Amove Click - manual uninstall & reinstall MAC os
  • Troubleshooting
  • FAQs
Powered by GitBook
On this page
  1. Amove Single Sign-On

Integrating with Okta

PreviousIntegrating with Azure Entra ID (AD)NextIntegrating with SAML

Last updated 7 months ago

1- Log in to your OKTA platform with admin privileges

2- Navigate to the Applications section and click the "Create App Integration" button.

3- Choose the OIDC (OpenID Connect) option for the sign-in method.

4- Select "Web application" as the application type.

5- In the General Settings, enter "Amove" as the App Integration Name. Refer to the screenshots below for Grant type details.

6- Add the following URIs in the "Sign-In Redirect URIs" section. Refer to the screenshot below for guidance.Add following URIs in the sign-in redirect URIs section. See screenshot below

https://app.amove.io/ssocallback

https://app.amove.io/usercallback

http://localhost:29123

7- In the Assignments section, you can either allow everyone in your organization access to the application or skip this step and assign groups later.

8- After creating the application, you will encounter a screen displaying the Client ID and Client Secret. These credentials will be used to connect your Amove client to OKTA.

9- Under the "Sign-On" section, edit the OpenID Connect ID Token and change the Issuer from "Dynamic" to your OKTA URL.

The OKTA URL will be used to connect your Amove client to the OKTA

10- Navigate to the Okta API Scopes tab and grant the following scope/permission.

okta.users.read.self

okta.groups.read

Okta.users.read

Okta.users.manage

11- In the Assignment section, edit the Admin user that will be used to import users and groups from OKTA. Change the "Assignment Master" from Group to Administrator.

12- Open the Amove.

13- Choose "Account" from the sidebar menu on the left side.

14- Click on Configure button in Okta Box.

15- Enter the Client ID, Client Secret, and OpenID URL to establish a connection with your OKTA.