Okta OAuth2 Platform
Okta OAuth2 Platform, a Single Sign-On (SSO) provider, offers cloud software that helps companies manage and secure user authentication into modern applications.
The following sections explain prerequisites, resources, and instructions for integrating with SaaS Management.
Stored Okta OAuth2 Platform Information
The following table describes the available integration tasks and stored data within SaaS Management.
|
|
HR Roster
|
|
Application Roster
|
|
Application Access
|
|
Application Discovery
|
|
SSO Application Roster
|
|
•
|
Application Instance ID |
|
SSO Application Access
|
|
•
|
Occurred (Application Launch) |
|
•
|
Application Instance ID |
|
Note:The information stored is subject to change as enhancements are made to the SaaS application.
Required Minimum Permissions for Okta OAuth2 Platform
The minimum API required permissions are based on the Required Scopes for Okta OAuth2 Platform and the Required User and Application Role for Okta OAuth2 Platform.
Required Scopes for Okta OAuth2 Platform
For more information on the required scopes, see Okta’s Developer documentation topic, OAuth 2.0 Scopes.
|
|
|
okta.users.read
|
Enables you to read the list of users in your Okta account.
|
Application Roster
HR Roster
SSO Application Roster
|
okta.logs.read
|
Enables you to read the user access event details in your Okta account.
|
Application Access
SSO Application Access
|
okta.apps.read
|
Enables you to read the SSO Apps in your Okta account.
|
Application Discovery
SSO Application Roster
|
Required User and Application Role for Okta OAuth2 Platform
Note:The following user and application role is not applicable to Flexera One roles.
|
|
Super Administrator
|
The user must have the Super Administrator role to grant the application permissions.
For more information, see Okta’s Developer documentation topic, Implement OAuth for Okta With a Service App.
|
Note:
|
|
Super Administrator
|
The application must have the Super Administrator role to read the users, apps, and the log.
For more information, see Okta’s Developer documentation topic, Assign Admin Roles to the OAuth 2.0 Service App.
|
Note:Consider the following:
|
•
|
The admin roles determine which resources the admin can perform the actions on. For example, the admin can assign resources to a specific group of users or to a specific set of apps. |
|
•
|
Scopes determine the action that the admin can perform. For example, the admin can manage users, read applications, and more. |
Authentication Method for Okta OAuth2 Platform
The required authentication method is OAuth 2.0 Client Credentials Flow With JWT Assertion.
Required Credentials for Okta OAuth2 Platform
The following credentials are required:
|
•
|
Number of API calls allowed per minute. |
Obtaining Client ID and Private Key for Okta OAuth2 Platform
To obtain a Client ID and a Private Key, perform these high-level steps. The Private Key is only used to sign the JSON Web Token (JWT), which is then used for requesting the scoped access token.
To obtain the Client ID and Private Key:
|
1.
|
Sign in to your Okta organization as a user with administrative privileges. |
|
2.
|
In the Admin Console, go to Applications > Applications, and then click Create App Integration. The Create a New App Integration page opens. |
|
3.
|
On the Create a New App Integration page: |
|
a.
|
Select the following sign-in method: API Services—Interact with Okta APIs using the scoped OAuth 2.0 access tokens for machine-to-machine authentication. |
|
4.
|
Enter a name for your app integration and click Save. |
|
a.
|
Edit the client credentials. |
|
b.
|
Change the client authentication to Public key / Private key. |
|
6.
|
Leave the default option as Save keys in Okta and click the Add Key button. The Add a Public Key dialog opens. |
|
7.
|
In the Add a Public Key dialog: |
|
a.
|
Scroll down and on the upper-right side, click Generate New Key. |
|
b.
|
After the key is generated, scroll down to the Private Key - Copy this! section and on the left side select PEM. |
|
c.
|
Copy and paste the private key to a separate file, as the private key is displayed only once. |
|
8.
|
From the General tab, go to the Okta API Scopes tab and grant access to the following three scopes: |
|
9.
|
From the General tab, go to the Admin Roles tab. |
|
a.
|
Click Edit Assignments to go to the Administrator Assignment by Admin screen. |
|
b.
|
Go to the Complete the Assignment section. |
|
c.
|
Click the Role dropdown list, enter Super Administrator in the search box, and select the Super Administrator role. |
|
d.
|
Click Save Changes to grant the Super Administrator role. |
Note:You can also grant the Super Administrator role by following the instructions in the Okta Developer documentation topic, Assign Admin Roles to Apps.
|
10.
|
As an option, you can set the API rate limit. Go to the Applications Rate Limits tab and edit the number of API calls allowed. By default, the API rate limit is set to 50%. |
Integrating Okta OAuth2 Platform With SaaS Management
Complete the following steps to integrate Okta OAuth2 Platform with SaaS Management.
To integrate Okta OAuth2 Platform with SaaS Management:
|
2.
|
In SaaS Management, add the Okta OAuth2 platform application. For more information, see Adding an Application. |
|
3.
|
Sign in to the Okta Platform portal homepage. Copy and paste your domain URL into the URL field in SaaS Management, which follows the convention: mycompany.okta.com. |
Note:The Private Key is only used to sign the JWT fields.
|
5.
|
Number of API calls allowed per minute is an optional SaaS Management field. This field limits the number of API calls made by an integration to Okta Platform. For more information, see Okta Platform’s Rate Limits. |
Note:Leave the Number of API calls allowed per minute field blank for automatic rate limit handling.
Tip:After the Application Discovery integration task has been enabled after 24 hours, you can add the discovered SSO enabled applications to your list of Managed SaaS Applications. For more information, see Adding Discovered SSO Enabled Applications to Your List of Managed SaaS Applications.
Okta OAuth2 Platform API Endpoints
HR Roster, Application Roster
https://<<Domain-URL>>/api/v1/users
Application Access and SSO Application Access
https://<<Domain-URL>>/api/v1/logs
SSO Application Roster
|
•
|
https://<<Domain-URL>>/api/v1/users |
|
•
|
https://<<Domain-URL>>/api/v1/apps |
|
•
|
https://<<Domain-URL>>/api/v1/apps/<<app instance id>>/users |
Application Discovery
https://<<Domain-URL>>/api/v1/apps