Setting up Okta as an OIDC provider

Setting up Okta as an OIDC provider

To configure an Okta application to serve as your OIDC authentication provider for MKE 4k:

  1. Navigate to (Okta)[https://www.okta.com/] and sign in to your account dashboard.
  2. Select OIDC - OpenID Connect for Sign-in method.
  3. Select Web Application for Application Type.
  4. For App integration name, choose a name that you can easily remember.
  5. Configure the host for your redirect URLs:
    • Sign-in redirect URIs: http://<MKE 4k hostname>/dex/login
    • Sign-out redirect URIs: http://<MKE 4k hostname>
  6. Click Save to generate the clientSecret and clientID in the General table of the application.
  7. Add the generated clientSecret and clientID values to your mke4.yaml configuration file.
  8. Run the mkectl apply command with your mke4.yaml configuration file.

Test authentication flow

  1. Navigate to the MKE 4k dashboard: https://<MKE 4k hostname>
  2. Select Log in with SAML. This will redirect you to the Okta login page for your application.
  3. Enter your credentials and click Sign In. If authentication is successful, you will be redirected to the MKE 4k dashboard.
Last updated on