Integrating with Okta

1- Log in to your OKTA platform with admin privileges

2- Navigate to the Applications section and click the "Create App Integration" button.

3- Choose the OIDC (OpenID Connect) option for the sign-in method.

4- Select "Web application" as the application type.

5- In the General Settings, enter "Amove" as the App Integration Name. Refer to the screenshots below for Grant type details.

6- Add the following URIs in the "Sign-In Redirect URIs" section. Refer to the screenshot below for guidance.Add following URIs in the sign-in redirect URIs section. See screenshot below

https://app.amove.io/ssocallback

https://app.amove.io/usercallback

http://localhost:29123

7- In the Assignments section, you can either allow everyone in your organization access to the application or skip this step and assign groups later.

8- After creating the application, you will encounter a screen displaying the Client ID and Client Secret. These credentials will be used to connect your Amove client to OKTA.

9- Under the "Sign-On" section, edit the OpenID Connect ID Token and change the Issuer from "Dynamic" to your OKTA URL.

The OKTA URL will be used to connect your Amove client to the OKTA

10- Navigate to the Okta API Scopes tab and grant the following scope/permission.

okta.users.read.self

okta.groups.read

Okta.users.read

Okta.users.manage

11- In the Assignment section, edit the Admin user that will be used to import users and groups from OKTA. Change the "Assignment Master" from Group to Administrator.

12- Open the Amove.

13- Choose "Account" from drop down menu on top right side.

14- Click on Configure button in Okta Box.

15- Enter the Client ID, Client Secret, and OpenID URL to establish a connection with your OKTA.

Last updated