Okta
Create an OIDC application
Note: If you have a standard Okta account you must first navigate to your Okta Org's admin portal (step 1). Developer accounts can skip to Step 2.
- Go to your org and click
Adminin the top right corner to access the admin portal - Select
Applications - Select
Add Application - Choose
WebandOpenID Connect. Then clickCreate. - Give it a name, enter the URL of your Ambassador load balancer in
Base URIsand the callback URL{AMBASSADOR_URL}/.ambassador/oauth2/redirection-endpointas theLogin redirect URIs
- Go to your org and click
Copy the
Client IDandClient Secretand use them to fill in theClientIDandSecretof you Okta OAuthFilter.Get the
audienceconfiguration- Select
APIandAuthorization Servers - You can use the default
Authorization Serveror create your own. - If you are using the default, the
audienceof your Okta OAuthFilterisapi://default - The value of the
authorizationURLis theIssuer URIof theAuthorization Server
- Select
Configure Filter and FilterPolicy
Configure your OAuth Filter and FilterPolicy with the following:
---apiVersion: getambassador.io/v2kind: Filtermetadata:name: okta-filternamespace: defaultspec:OAuth2:authorizationURL: https://{OKTA_DOMAIN}.okta.com/oauth2/defaultaudience: api://defaultclientID: CLIENT_IDsecret: CLIENT_SECRETprotectedOrigins:- origin: https://datawire-ambassador.com
---apiVersion: getambassador.io/v2kind: FilterPolicymetadata:name: httpbin-policynamespace: defaultspec:rules:- host: "*"path: /httpbin/ipfilters:- name: okta-filter ## Enter the Filter name from abovearguments:scope:- "openid"- "profile"
Note: Scope values openid and profile are required at a
minimum. Other scope values can be added to the Authorization Server.
Questions?
We’re here to help. If you have questions, join our Slack or contact us.