Setting up Okta as an OIDC provider
To configure an Okta application to serve as your OIDC authentication provider for MKE 4k:
- Navigate to (Okta)[https://www.okta.com/] and sign in to your account dashboard.
- Select OIDC - OpenID Connect for Sign-in method.
- Select Web Application for Application Type.
- For App integration name, choose a name that you can easily remember.
- Configure the host for your redirect URLs:
- Sign-in redirect URIs:
http://<MKE 4k hostname>/dex/login
- Sign-out redirect URIs:
http://<MKE 4k hostname>
- Sign-in redirect URIs:
- Click Save to generate the
clientSecret
andclientID
in theGeneral
table of the application. - Add the generated
clientSecret
andclientID
values to yourmke4.yaml
configuration file. - Run the
mkectl apply
command with yourmke4.yaml
configuration file.
Test authentication flow
- Navigate to the MKE 4k dashboard:
https://<MKE 4k hostname>
- Select Log in with SAML. This will redirect you to the Okta login page for your application.
- Enter your credentials and click Sign In. If authentication is successful, you will be redirected to the MKE 4k dashboard.
Last updated on