Okta

  1. Create an OIDC application

    Note: If you have a standard Okta account you must first navigate to your Okta Org's admin portal (step 1). Developer accounts can skip to Step 2.

    • Go to your org and click Admin in the top right corner to access the admin portal
    • Select Applications
    • Select Add Application
    • Choose Web and OpenID Connect. Then click Create.
    • Give it a name, enter the URL of your Ambassador load balancer in Base URIs and the callback URL {AMBASSADOR_URL}/.ambassador/oauth2/redirection-endpoint as the Login redirect URIs
  2. Copy the Client ID and Client Secret and use them to fill in the ClientID and Secret of you Okta OAuth Filter.

  3. Get the audience configuration

    • Select API and Authorization Servers
    • You can use the default Authorization Server or create your own.
    • If you are using the default, the audience of your Okta OAuth Filter is api://default
    • The value of the authorizationURL is the Issuer URI of the Authorization Server

Configure Filter and FilterPolicy

Configure your OAuth Filter and FilterPolicy with the following:

---
apiVersion: getambassador.io/v2
kind: Filter
metadata:
name: okta-filter
namespace: default
spec:
OAuth2:
authorizationURL: https://{OKTA_DOMAIN}.okta.com/oauth2/default
audience: api://default
clientID: CLIENT_ID
secret: CLIENT_SECRET
protectedOrigins:
- origin: https://datawire-ambassador.com
---
apiVersion: getambassador.io/v2
kind: FilterPolicy
metadata:
name: httpbin-policy
namespace: default
spec:
rules:
- host: "*"
path: /httpbin/ip
filters:
- name: okta-filter ## Enter the Filter name from above
arguments:
scope:
- "openid"
- "profile"

Note: Scope values openid and profile are required at a minimum. Other scope values can be added to the Authorization Server.

Questions?

We’re here to help. If you have questions, join our Slack, contact us, or request a demo.