Setting up Okta as an OIDC provider#
To configure an Okta application to serve as your OIDC authentication provider for MKE 4k:
- Navigate to Okta and sign in to your account dashboard.
- Navigate to Applications > Applications and click Create App Integration.
- Select OIDC - OpenID Connect for Sign-in method.
- Select Web Application for Application Type.
-
For App integration name, choose a suitable name.
-
Configure the host for your redirect URLs:
- Sign-in redirect URIs:
http://<MKE 4k hostname>/dex/callback - Sign-out redirect URIs:
http://<MKE 4k hostname>
- Sign-in redirect URIs:
-
Click Save to generate the
clientSecretandclientIDin theGeneraltable of the application. - Set
.spec.authentication.oidc.issuerto your Okta domain,https://example.okta.comfor example, in yourmke4.yamlconfiguration file. - Add the generated
clientSecretandclientIDvalues to yourmke4.yamlconfiguration file. - Run the
mkectl applycommand with yourmke4.yamlconfiguration file.
Test authentication flow#
- Navigate to the MKE 4k dashboard:
https://<MKE 4k hostname> - Select Log in with oidc. This will redirect you to the Okta login page for your application.
- Enter your credentials and click Sign In. If authentication is successful, you will be redirected to the MKE 4k dashboard.