Skip to content

Commit 7bd00f1

Browse files
Tom GotsmanTom Gotsman
authored andcommitted
okta docs'
1 parent 8c02789 commit 7bd00f1

File tree

1 file changed

+98
-21
lines changed

1 file changed

+98
-21
lines changed

docs/ai_builder/integrations/okta_auth.md

Lines changed: 98 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -7,19 +7,38 @@ description: Use Okta for secure identity and access management via Single Sign-
77

88
The **Okta Auth Manager Integration** allows your app to authenticate users through [Okta](https://okta.com). This integration provides secure OAuth 2.0 / OIDC authentication and supports multi-tenant environments with customizable access policies.
99

10+
11+
## What You Can Do
12+
13+
With Okta, your app can:
14+
- Authenticate users securely through Okta’s identity platform.
15+
- Enable **SSO** for enterprise users.
16+
- Manage user roles, groups, and access permissions.
17+
- Protect sensitive data and actions with **OAuth 2.0** and **OpenID Connect (OIDC)**.
18+
- Integrate with other identity workflows like MFA or adaptive policies.
19+
20+
1021
```python exec
1122
import reflex as rx
1223
from reflex_image_zoom import image_zoom
1324
```
1425

26+
27+
28+
## Step 1: Set Up Okta OIDC App
29+
30+
Before connecting, you need to create an OIDC application in the Okta Admin Console:
31+
32+
1 - Go to [Okta Admin Console](https://login.okta.com)**Applications****Applications**
33+
34+
35+
2 - Click **Create App Integration**
36+
1537
```python eval
1638
rx.el.div(
1739
image_zoom(
1840
rx.image(
19-
src=rx.color_mode_cond(
20-
"/ai_builder/integrations/okta_light.webp",
21-
"/ai_builder/integrations/okta_dark.webp",
22-
),
41+
src="/ai_builder/integrations/okta_auth_1.png",
2342
class_name="p-2 rounded-md h-auto",
2443
border=f"0.81px solid {rx.color('slate', 5)}",
2544
),
@@ -29,34 +48,92 @@ rx.el.div(
2948
)
3049
```
3150

32-
## Step 1: Set Up Okta OIDC App
51+
3 - Select **OIDC – OpenID Connect** and choose **Web Application**
3352

34-
Before connecting, you need to create an OIDC application in the Okta Admin Console:
53+
```python eval
54+
rx.el.div(
55+
image_zoom(
56+
rx.image(
57+
src="/ai_builder/integrations/okta_auth_2.png",
58+
class_name="p-2 rounded-md h-auto",
59+
border=f"0.81px solid {rx.color('slate', 5)}",
60+
),
61+
class_name="rounded-md overflow-hidden",
62+
),
63+
class_name="w-full flex flex-col rounded-md cursor-pointer",
64+
)
65+
```
3566

36-
1. Go to [Okta Admin Console](https://login.okta.com)**Applications**
37-
2. Click **Create App Integration**
38-
3. Select **OIDC – OpenID Connect** and choose **Web Application**
39-
4. Configure your app settings:
40-
- **Sign-in redirect URIs**:
41-
`https://sb-39b61a39-c9bb-4877-8926-b309598edc58.fly.dev/authorization-code/callback`
67+
4 - Configure your app settings:
68+
- **Allow wildcard * in sign-in redirect URIs**
69+
- **Sign-in redirect URIs** found in the Okta Auth Manager integration settings in AI Builder:
70+
`https://{your-sandbox}/authorization-code/callback`
71+
- **Sign-out redirect URIs**:
72+
`https://{your-sandbox}`
4273
- Assign to the correct **Group** or **Everyone** depending on your access control
43-
5. Save the app integration.
4474

45-
## Step 2: Gather Your Credentials
75+
```python eval
76+
rx.el.div(
77+
image_zoom(
78+
rx.image(
79+
src="/ai_builder/integrations/okta_auth_3.png",
80+
class_name="p-2 rounded-md h-auto",
81+
border=f"0.81px solid {rx.color('slate', 5)}",
82+
),
83+
class_name="rounded-md overflow-hidden",
84+
),
85+
class_name="w-full flex flex-col rounded-md cursor-pointer",
86+
)
87+
```
88+
89+
5 - Save the app integration.
90+
91+
6 - Copy your **Client ID** (`OKTA_CLIENT_ID`) and **Client Secret** (`OKTA_CLIENT_SECRET`) from the app settings.
4692

47-
After creating your Okta app, collect the following information:
93+
```python eval
94+
rx.el.div(
95+
image_zoom(
96+
rx.image(
97+
src="/ai_builder/integrations/okta_auth_4.png",
98+
class_name="p-2 rounded-md h-auto",
99+
border=f"0.81px solid {rx.color('slate', 5)}",
100+
),
101+
class_name="rounded-md overflow-hidden",
102+
),
103+
class_name="w-full flex flex-col rounded-md cursor-pointer",
104+
)
105+
```
48106

49-
- **OKTA_CLIENT_ID**: `0oa1abcdXYZ2efGhI5d7`
50-
*Your app’s Client ID from the Okta Admin Console*
51107

52-
- **OKTA_CLIENT_SECRET**: `xYzABC1234567DefghIJKLmnopQrstuVW`
53-
*Your app’s Client Secret (keep this secure)*
108+
## Step 2: Finding Your Okta Issuer URI
109+
110+
1. In the Okta Admin Console, go to **Security****API****Authorization Servers**
111+
2. Click on the **default** server and copy the **Issuer URI**.
112+
3. Remove the trailing `/oauth2/default` from the URI to get your **Okta Issuer URI** (`OKTA_ISSUER_URI`).
113+
114+
Example:
115+
```
116+
If your Issuer URI is `https://{yourOktaDomain}.okta.com/oauth2/default`, use `https://{yourOktaDomain}.okta.com`
117+
```
118+
119+
```python eval
120+
rx.el.div(
121+
image_zoom(
122+
rx.image(
123+
src="/ai_builder/integrations/okta_auth_5.png",
124+
class_name="p-2 rounded-md h-auto",
125+
border=f"0.81px solid {rx.color('slate', 5)}",
126+
),
127+
class_name="rounded-md overflow-hidden",
128+
),
129+
class_name="w-full flex flex-col rounded-md cursor-pointer",
130+
)
131+
```
54132

55-
- **OKTA_ISSUER_URI**: `https://dev-12345678.okta.com/oauth2/default`
56-
*The Issuer URL from your app’s settings*
57133

58134
> **Note:** Always use separate Okta apps for dev, staging, and production environments to avoid mixing credentials.
59135
136+
60137
## Step 3: Configure the Integration
61138

62139
1. Go to the **Integrations** section in your app settings by clicking **`@`** and then selecting the **Integrations** tab.

0 commit comments

Comments
 (0)