Setting up Okta as an OIDC provider
To configure an Okta application to serve as your OIDC authentication provider for MKE 4:
- Navigate to (Okta)[https://www.okta.com/] and sign in to your account dashboard.
- Select OIDC - OpenID Connect for Sign-in method.
- Select Web Application for Application Type.
- For App integration name, choose a name that you can easily remember.
- Configure the host for your redirect URLs:
- Sign-in redirect URIs:
http://{MKE hostname}/dex/login
- Sign-out redirect URIs:
http://{MKE hostname}
- Sign-in redirect URIs:
- Click Save to generate the
clientSecret
andclientID
in theGeneral
table of the application. - Add the generated
clientSecret
andclientID
values to your MKE configuration file. - Run the
mkectl apply
command with your MKE configuration file.
Test authentication flow
- Navigate to the MKE dashboard:
https://{MKE hostname}
- Select Log in with SAML. This will redirect you to the Okta login page for your application.
- Enter your credentials and click Sign In. If authentication is successful, you will be redirected to the MKE dashboard.
Last updated on