The following guide will assist you in configuring your application to use Okta for authentication.
- Log into the Okta admin console with administrative credentials, select
ApplicationsthenApplications - Click
Add application, thenCreate app integration - Select
Open ID Connectas the sign in method and andWeb applicationas the application type - Enter
Lithnet Access Manageror another suitable application name and optionally provide a logo - Ensure that
authorization codeis the selected grant type - For the sign in redirect URI, enter the base URL where your Lithnet Access Manager app is hosted followed by
/auth/(eghttps://accessmanager.lithnet.local/auth/) - Set the sign out redirect URI to your base URL, and append
/auth/logoutto the end of it (eghttps://accessmanager.lithnet.local/auth/logout) - Assign the appropriate users to the app and save the new app
- From the new app page, copy the
client IDandclient secretvalue for use later in the setup process - Select
Directoryfrom the main menu bar, and selectProfile editor. Find theLithnet Access Managerapp in the list, and click theProfilebutton - Click
Add attributeand create a new attribute calledupn, of data typestring. Select both theattribute requiredandUser personalcheck boxes - Click the
Mappingsbutton. Find the UPN value, and map it to the okta attribute that contains the Active Directory UPN (eg aduser.userPrincipalName)
- Open the Lithnet Access Manager Service configuration tool
- Go to the
Authenticationpage and selectOpenID Connectas the authentication provider - Enter the URL of your okta tenant in the
Issuer/Authorityfield - Enter the client ID and secret obtained from the Okta setup process
We strongly recommend to modify your application sign-on policy to require multi-factor authentication for the use of this app.
