DocsEdge Stack
1.13
Single Sign-On with Okta
2 min • read
Single Sign-On with Okta
Create an OIDC application
Note: If you have a standard Okta account you must first navigate to your Okta Org's admin portal (step 1). Developer accounts can skip to Step 2.
- Go to your org and click
Adminin the top right corner to access the admin portal - Select
Applications - Select
Add Application - Choose
WebandOpenID Connect. Then clickCreate. - Give it a name, enter the URL of your Ambassador Edge Stack load balancer in
Base URIsand the callback URL{AMBASSADOR_URL}/.ambassador/oauth2/redirection-endpointas theLogin redirect URIs
- Go to your org and click
Copy the
Client IDandClient Secretand use them to fill in theClientIDandSecretof you Okta OAuthFilter.Get the
audienceconfiguration- Select
APIandAuthorization Servers - You can use the default
Authorization Serveror create your own. - If you are using the default, the
audienceof your Okta OAuthFilterisapi://default - The value of the
authorizationURLis theIssuer URIof theAuthorization Server
- Select
Configure Filter and FilterPolicy
Configure your OAuth Filter and FilterPolicy with the following:
Note: Scope values openid and profile are required at a
minimum. Other scope values can be added to the Authorization Server.