Before Security Center can use Okta to authenticate users with OpenID Connect, setup is required in Config Tool and the Okta Admin Console.
This example shows how to set up third-party authentication with Okta using the OpenID Connect (OIDC) UserInfo endpoint. The procedure is divided into three sections:
- Locating the properties in the Okta Admin Console
- Understanding the significance of each property
- Validating the properties before you can proceed
- Accessing corresponding help topics
To implement third-party authentication, you must have administrator rights in Security Center and Okta.
1 - Preparing Security Center
- Open Config Tool and connect to the Security Center main server as an administrator.
- From the Config Tool homepage, open the System task and click the Roles view.
- Click Add an entity (
) > Authentication Service.
The Creating a role: Authentication Service window opens.
- In the Specific info section, select the identity provider
and the authentication protocol and click Next.
- Provider
- Okta
- Protocol
- OpenID Connect
- In the Basic information section, enter a name and optional
description for the new Authentication Service role.
- If there are partitions in your system, select the partition of which this role
is a member and click Create.
Partitions determine which Security Center users have access to this entity. Only users who have been granted access to the partition can see this role.
- From the App registration page, copy the redirect
and logout URIs.
For more information, see About role endpoints configuration.
- Click NOTE: The Suspend button allows you to save and exit the configuration wizard temporarily. You can suspend the configuration at any time during the process.
.
2 - Preparing Okta
- An Okta administrator account
- At least one user provisioned
- At least one user group that contains the users you want to grant access to Security Center
- In the Okta Admin Console, select Create App Integration.
- In the Create a new app integration wizard, select
OIDC - OpenID Connect, Web
Application and click Next.
- On the New Web App Integration page, configure the
following settings and click Save:
-
App integration name: Enter the name of the App integration.
-
Sign-in redirect URIs: Copy from the
redirect URIs in Security Center
-
Sign-out redirect URIs: Copy from the
logout URIs in Security Center
-
Controlled access: Select Limit access
to selected groups and add the required groups.
-
App integration name: Enter the name of the App integration.
- On the General page for your application, copy the default
Client ID and Client
secret.
These are needed to configure Security Center. If required, you can generate a new client secret.
- Click the Okta API Scopes tab for your Security Center
application and grant the
okta.groups.read
andokta.users.read
operations. - Click
This URI is needed to configure Security Center.
and copy the Issuer URI for the default authorization
server. - Open the default authorization server, click the Claims
tab, and click Add Claim.
- Add a groups claim as follows and click Create:NOTE: The Matches regex filter with
.*
returns all groups to which the authenticated user belongs.If required, you can also use this filter to exclude certain groups from the claim. At least one group assigned to Security Center must be included with the claim to grant access.
3 - Integrating Security Center with Okta
- Before configuring an Authentication Service in Security Center, you must register the redirect and logout URIs in the Okta Admin Console.
- The system validates the properties at each step before you can proceed.
- In Config Tool, select the Authentication Service role created earlier and click
Configuration.
The App registration page of the Creating a role: Authentication Service window opens and you can resume the configuration.
- On the App registration page, click Next.
- On the Communicate with provider page, click
Start, enter Issuer and
Application (client) ID, and click
Next.
- Issuer
- Enter the Issuer URI that was copied from the default authorization server in Okta.
- Client ID
- Enter the Client ID that you copied from the Security Center application in Okta.
- In the Metadata section, enter the
URL and click Next.
The URL has the following syntax:
https://<OktaIssuerURI>/.well-known/openid-configuration
. - On the Accepted domains page, configure the
Default provider option:
- This option is turned off by default. When turned off, you must add at
least one domain name of users who can authenticate using this
Authentication Service.
- Turn on the Default provider option to use this
identity provider to authenticate users from all domains.
If you have multiple Authentication Service roles, only one role can be set as the default provider, and this option is disabled for all other roles.
CAUTION:Turning on the Default provider option deletes all domain names that were previously added.
- This option is turned off by default. When turned off, you must add at
least one domain name of users who can authenticate using this
Authentication Service.
- Specify whether or not to use this identity provider as a logon option.
If you select Yes, enter the name of the identity provider to be displayed on the logon screen with the text "Sign in with <display name>".
- Click Next.
- (Optional) On the Client authentication page, turn on the
Confidential client option to set Security Center as
a confidential client of this identity provider.
The Client secret field appears.
- (Optional) In the Client secret field, enter the client secret that was generated in the Okta Admin Console earlier.
- Click Next.
- On the Claims and scopes page, select the following properties:
- Username claim
- OpenID claim returned by the identity provider that contains the
username of the authenticated party.
Select: preferred_username
- Group claim
- OpenID claim returned by the identity provider that contains the
groups the authenticated party belongs to.
Select: groups
- Click Next.
- On the Groups page, click Add an item
(
), select an existing group or create a new user group, and click Next.
Tip: You can export the list of active users from Okta Admin Console as a CSV file and import the group into Security Center. You can add one or more Security Center user groups with the same name or unique identifier as the groups assigned to the Security Center application in Okta. - On the Test the configuration page, click Test
logon to validate the configuration, and click
Next.
For more information, see Testing a third-party authentication setup.
- On the Creation outcome page, verify that the information is correct and click .