Skip to content

Commit 63a26e8

Browse files
authored
Update okta.mdx
1 parent 3133f1c commit 63a26e8

File tree

1 file changed

+14
-8
lines changed
  • src/content/docs/cloudflare-one/identity/idp-integration

1 file changed

+14
-8
lines changed

src/content/docs/cloudflare-one/identity/idp-integration/okta.mdx

Lines changed: 14 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ Okta provides cloud software that helps companies manage and secure user authent
1010

1111
Additionally, you can configure Okta to use risk information from Zero Trust [user risk scores](/cloudflare-one/insights/risk-score/) to create SSO-level policies. For more information, refer to [Send risk score to Okta](/cloudflare-one/insights/risk-score/#send-risk-score-to-okta).
1212

13-
## Set up Okta as an OIDC provider (Okta App Catalog)
13+
## Set up Okta as an OIDC provider (Okta Application Catalog)
1414

1515
1. Log in to your Okta admin dashboard.
1616

@@ -32,26 +32,32 @@ Additionally, you can configure Okta to use risk information from Zero Trust [us
3232

3333
7. In the **Sign On** tab, copy the **Client ID** and **Client secret**.
3434

35-
8. In [Zero Trust](https://one.dash.cloudflare.com), go to **Settings** > **Authentication**.
35+
8. Scroll down to the **OpenID ConnectID Token** and select **Edit**.
36+
37+
![Configuring the Groups claim filter in Okta](~/assets/images/cloudflare-one/identity/okta/okta-2.png)
38+
39+
9. Set the **Groups claim filter** to _Matches regex_ and its value to `.*`.
40+
41+
10. In [Zero Trust](https://one.dash.cloudflare.com), go to **Settings** > **Authentication**.
3642

37-
9. Under **Login methods**, select **Add new**. Select **Okta** as your identity provider.
43+
11. Under **Login methods**, select **Add new**. Select **Okta** as your identity provider.
3844

39-
10. Fill in the following information:
45+
12. Fill in the following information:
4046
- **Name**: Name your identity provider.
4147
- **App ID**: Enter your Okta client ID.
4248
- **Client secret**: Enter your Okta client secret.
4349
- **Okta account URL**: Enter your [Okta domain](https://developer.okta.com/docs/guides/find-your-domain/main/), for example `https://my-company.okta.com`.
4450

45-
11. (Optional) Create an Okta API token and enter it in Zero Trust (the token can be read-only). This will prevent your Okta groups from failing if you have more than 100 groups.
51+
13. (Optional) Create an Okta API token and enter it in Zero Trust (the token can be read-only). This will prevent your Okta groups from failing if you have more than 100 groups.
4652

47-
12. (Optional) To configure [custom OIDC claims](/cloudflare-one/identity/idp-integration/generic-oidc/#custom-oidc-claims):
53+
14. (Optional) To configure [custom OIDC claims](/cloudflare-one/identity/idp-integration/generic-oidc/#custom-oidc-claims):
4854
1. In Okta, create a [custom authorization server](https://developer.okta.com/docs/guides/customize-authz-server/main/) and ensure that the `groups` scope is enabled.
4955
2. In Zero Trust, enter the **Authorization Server ID** obtained from Okta.
5056
3. Under **Optional configurations**, enter the claims that you wish to add to your users' identity.
5157

52-
13. (Optional) Enable [Proof of Key Exchange (PKCE)](https://www.oauth.com/oauth2-servers/pkce/). PKCE will be performed on all login attempts.
58+
15. (Optional) Enable [Proof of Key Exchange (PKCE)](https://www.oauth.com/oauth2-servers/pkce/). PKCE will be performed on all login attempts.
5359

54-
14. Select **Save**.
60+
16. Select **Save**.
5561

5662
## Set up Okta as an OIDC provider (Custom OIDC Application)
5763

0 commit comments

Comments
 (0)