Okta

Prerequisites

A verified account on Okta. Okta activates your account only if email verification is successful.

Here's a reference guide to set up your Okta org and application: Link

Who Can Perform This Action?

Tutorial

Steps on Okta Admin Console

Once your Okta org is set up, create an app integration on Okta to get a Client ID and Client Secret.

  1. In the Admin Console, go to ApplicationsApplications.

  2. Click Create App Integration.

  3. Select OIDC - OpenID Connect as the Sign-in method. Click here to read more.

  4. Select Web as the application type and click Next.

  5. On the App Integration page:

    • Give a name to your application.

    • Select the Interaction Code and Refresh Token checkbox.

    • Now go to Devtron's Global Configurations → SSO Login Services → OIDC.

    • Copy the redirect URI given in the helper text (might look like: https://xxx.xxx.xxx/xxx/callback).

    • Return to the Okta screen, and remove the prefilled value in Sign-in redirect URIs.

    • Paste the copied URI in Sign-in redirect URIs.

    • Click Save.

  6. On the General tab:

    • Note the Client ID value.

    • Click the Edit option.

    • In Client Authentication, choose Client Secret.

    • Click Save.

    • Click Generate new secret.

    • Note the Client Secret value.

Steps on Devtron

  1. Go to the Global ConfigurationsSSO Login ServicesOIDC.

  2. In the URL field, enter the Devtron application URL (a valid https link) where it is hosted.

  3. Under Configuration tab, locate the config object, and provide the clientID and clientSecret of the app integration you created on Okta.

  4. Add a key insecureSkipEmailVerified: true. Note that this key is only required for Okta SSO. For other types of OIDC SSO, refer OIDC supported configurations.

  5. Provide issuer value as https://${yourOktaDomain}. Replace ${yourOktaDomain} with your domain on Okta as shown in the video.

  6. For providing redirectURI or callbackURI registered with the SSO provider, you can either select Configuration or Sample Script. Note that the redirect URI is already given in the helper text (as seen in the previous section).

  7. Click Save to create and activate Okta SSO login.

Sample Configuration

Figure 1: Sample Configuration

Now your users will be able to log in to Devtron using the Okta authentication method. Note that existing signed-in users will be logged out, and they have to log in again using their OIDC account.

Auto-assign Permissions

Prerequisites

Since Okta provides centralized user management through its Universal Directory, this feature further simplifies the onboarding process of organizations with a large number of users. It also eliminates repetitive permission assignment by automatically mapping your Okta groups to Devtron’s Permission Groups during single sign-on (SSO) login.

If you’ve defined groups in your Okta Universal Directory, you can create corresponding permission groups in Devtron with the same names. When members of those Okta groups first log in to Devtron, they’ll automatically inherit the permissions from their Devtron permission group. This means you can’t manually adjust or add individual permissions for users mapped to a permission group.

Enable Auto-Assign Permissions

  1. Go to the Global ConfigurationsSSO Login ServicesOIDC.

  2. Add a key insecureEnableGroups: true as shown in the image below. Note that this key is only required for Okta SSO. For other types of OIDC SSO, refer OIDC supported configurations.

  3. Enable the toggle for Auto-assign permission to users on SSO login.

  4. Click Update.

Figure 2: Sample Configuration for Auto -assign Permission

Note

Tip

If your Okta groups permissions aren't reflecting in Devtron, a quick sign-out and sign-in can resolve the issue.

Last updated

Was this helpful?