You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: authentication/Okta/README.md
+40-14
Original file line number
Diff line number
Diff line change
@@ -108,10 +108,10 @@ After activating your account by email, you should have access to your Okta inst
108
108
In Menu **Directory** / **People**:
109
109
* Click **Add Person** button
110
110
* User type: *User*
111
-
* First name: ``<YourFirstName>``
112
-
* Last name: ``<YourLastName>``
113
-
* Username: ``<YourEmailAddress>``
114
-
* Primary email: ``<YourEmailAddress>``
111
+
* First name: `<YourFirstName>`
112
+
* Last name: `<YourLastName>`
113
+
* Username: `<YourEmailAddress>`
114
+
* Primary email: `<YourEmailAddress>`
115
115
* Groups (optional): ***odm-admin***
116
116
* Click **Save**
117
117
@@ -166,21 +166,46 @@ In this step, we augment the token with meta-information that is required by the
166
166
167
167
In **Claims** tab, create the following claims:
168
168
169
-
* Click **Add claim**
170
-
**groups - Access Token* claim:
169
+
* Click **Add claim** and set the fields:
171
170
* Name: *groups*
172
171
* Include in token type: *Access Token*
173
172
* Value type: *Groups*
174
173
* Filter: **Equals**: *odm-admin*
175
-
**groups - Id Token* claim:
174
+
* Click **Create**
175
+
* Click **Add claim** and set the fields:
176
176
* Name: *groups*
177
-
* Include in token type: *Id Token*
177
+
* Include in token type: *ID Token* (Always)
178
178
* Value type: *Groups*
179
179
* Filter: **Equals**: odm-admin
180
+
* Click **Create**
180
181
181
182

182
183
183
-
4. Verify the content of the token.
184
+
4. Add an Access Policy and Rule.
185
+
186
+
Access Policies are containers for Rules.
187
+
Rules define particular token lifetimes for a given combination of grant type, user, and scope. If no matching rule is found, then the authorization request fails.
188
+
189
+
Let's create an Access Policy and rule for the *ODM Application*.
190
+
191
+
In the **Access Policies** tab:
192
+
* Click **Add New Access Policy**
193
+
* Name: *ODM Application policy*
194
+
* Description: *ODM Application policy*
195
+
* Assign to: **The following clients** and enter: *ODM Application*
196
+
* Click **Create Policy**
197
+
* Click **Add Rule**
198
+
* Rule Name: *default rule*
199
+
* In **grant type**:
200
+
* Check **Client Credentials**
201
+
* Check **Authorization Code**
202
+
* Check **Device Authorization**
203
+
* Check **Implicit (hybrid)**
204
+
* Click **Create rule**
205
+
206
+

207
+
208
+
5. Verify the content of the token.
184
209
185
210
Check that the login name and groups meta-information are available in the ID token.
186
211
@@ -293,8 +318,10 @@ In this step, we augment the token with meta-information that is required by the
293
318
294
319
```
295
320
helm search repo ibm-odm-prod
321
+
```
322
+
```
296
323
NAME CHART VERSION APP VERSION DESCRIPTION
297
-
ibm-helm/ibm-odm-prod 24.0.0 9.0.0.0 IBM Operational Decision Manager
324
+
ibm-helm/ibm-odm-prod 24.1.0 9.0.0.1 IBM Operational Decision Manager
298
325
```
299
326
300
327
3. Run the `helm install` command.
@@ -306,6 +333,7 @@ In this step, we augment the token with meta-information that is required by the
@@ -352,15 +380,13 @@ In this step, we augment the token with meta-information that is required by the
352
380
- In the **General** tab, click **Edit** on the **General Settings** section.
353
381
- In the **LOGIN** section, click **+ Add URI** in the **Sign-in redirect URIs** section and add the Decision Center redirect URI you got earlier (`https://<DC_HOST>/decisioncenter/openid/redirect/odm` -- do not forget to replace <DC_HOST> by your actual host name!)
354
382
- Repeat the previous step for all other redirect URIs.
355
-
- Click **Save** at the bottom of the LOGIN section.
383
+
- Click **Save** at the bottom of the **General Settings** section.
Well done! You can now connect to ODM using the endpoints you got [earlier](#register-the-odm-redirect-url), and log in as an ODM admin with the account you created in [the first step](#manage-groups-and-users).
362
-
363
-
>Note: Logout in ODM components using Okta authentication raises an error for the time being. This is a known issue. We recommend you to use a private window in your browser to log in, so that logout is done just by closing this window.
389
+
Well done! You can now connect to ODM using the endpoints you got [earlier](#register-the-odm-redirect-urls), and log in as an ODM admin with the account you created in [the first step](#manage-groups-and-users).
0 commit comments