This repository has been archived by the owner on Feb 11, 2023. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 149
OKTA Configuration
Payton Garland edited this page Feb 5, 2019
·
3 revisions
- Sign in to OKTA with your administrator account and navigate to the
Applications
tab. - Add Application
- Select the
Web
application type - Base URI: CloudFront distribution domain name (https://{cf-endpoint}.cloudfront.net)
- Login Redirect URI: CloudFront distribution domain name with callback path (https://{cf-endpoint}.cloudfront.net/_callback)
- Group Assignments: Optional
- Grant Type Allowed: Authorization Code
- Done
- Select the
- Gather the following information for Lambda configuration
- Client Id and Client Secret from the application created in our previous step (can be found at the bottom of the general tab)
- Base Url
- This is named the 'Org URL' and can be found in the top right of the Dashboard tab.
- Execute
./build.sh
in the downloaded directory. NPM will run to download dependencies and a RSA key will be generated. - Choose
OKTA
as the authorization method and enter the values for Base URL (Org URL), Client ID, Client Secret, Redirect URI, and Session Duration - Upload the resulting
zip
file found in your distribution folder using the AWS Lambda console and jump to the configuration step