Skip to content

Commit 4780aae

Browse files
authored
Merge pull request #200 from DecisionsDev/review-okta-fred
DBACLD-155793 Validate Instructions for OKTA as OIDC provider
2 parents ee3fdb8 + cca7206 commit 4780aae

File tree

3 files changed

+40
-14
lines changed

3 files changed

+40
-14
lines changed

authentication/Okta/README.md

+40-14
Original file line numberDiff line numberDiff line change
@@ -108,10 +108,10 @@ After activating your account by email, you should have access to your Okta inst
108108
In Menu **Directory** / **People**:
109109
* Click **Add Person** button
110110
* User type: *User*
111-
* First name: ``<YourFirstName>``
112-
* Last name: ``<YourLastName>``
113-
* Username: ``<YourEmailAddress>``
114-
* Primary email: ``<YourEmailAddress>``
111+
* First name: `<YourFirstName>`
112+
* Last name: `<YourLastName>`
113+
* Username: `<YourEmailAddress>`
114+
* Primary email: `<YourEmailAddress>`
115115
* Groups (optional): ***odm-admin***
116116
* Click **Save**
117117

@@ -166,21 +166,46 @@ In this step, we augment the token with meta-information that is required by the
166166

167167
In **Claims** tab, create the following claims:
168168

169-
* Click **Add claim**
170-
* *groups - Access Token* claim:
169+
* Click **Add claim** and set the fields:
171170
* Name: *groups*
172171
* Include in token type: *Access Token*
173172
* Value type: *Groups*
174173
* Filter: **Equals**: *odm-admin*
175-
* *groups - Id Token* claim:
174+
* Click **Create**
175+
* Click **Add claim** and set the fields:
176176
* Name: *groups*
177-
* Include in token type: *Id Token*
177+
* Include in token type: *ID Token* (Always)
178178
* Value type: *Groups*
179179
* Filter: **Equals**: odm-admin
180+
* Click **Create**
180181

181182
![Add Claim Result](images/ResultAddClaims.png)
182183

183-
4. Verify the content of the token.
184+
4. Add an Access Policy and Rule.
185+
186+
Access Policies are containers for Rules.
187+
Rules define particular token lifetimes for a given combination of grant type, user, and scope. If no matching rule is found, then the authorization request fails.
188+
189+
Let's create an Access Policy and rule for the *ODM Application*.
190+
191+
In the **Access Policies** tab:
192+
* Click **Add New Access Policy**
193+
* Name: *ODM Application policy*
194+
* Description: *ODM Application policy*
195+
* Assign to: **The following clients** and enter: *ODM Application*
196+
* Click **Create Policy**
197+
* Click **Add Rule**
198+
* Rule Name: *default rule*
199+
* In **grant type**:
200+
* Check **Client Credentials**
201+
* Check **Authorization Code**
202+
* Check **Device Authorization**
203+
* Check **Implicit (hybrid)**
204+
* Click **Create rule**
205+
206+
![Add Policy and Rule Result](images/ResultAddAccessPolicy.png)
207+
208+
5. Verify the content of the token.
184209

185210
Check that the login name and groups meta-information are available in the ID token.
186211

@@ -293,8 +318,10 @@ In this step, we augment the token with meta-information that is required by the
293318
294319
```
295320
helm search repo ibm-odm-prod
321+
```
322+
```
296323
NAME CHART VERSION APP VERSION DESCRIPTION
297-
ibm-helm/ibm-odm-prod 24.0.0 9.0.0.0 IBM Operational Decision Manager
324+
ibm-helm/ibm-odm-prod 24.1.0 9.0.0.1 IBM Operational Decision Manager
298325
```
299326
300327
3. Run the `helm install` command.
@@ -306,6 +333,7 @@ In this step, we augment the token with meta-information that is required by the
306333
--set image.repository=cp.icr.io/cp/cp4a/odm --set image.pullSecrets=icregistry-secret \
307334
--set oidc.enabled=true \
308335
--set internalDatabase.persistence.enabled=false \
336+
--set internalDatabase.populateSampleData=true \
309337
--set customization.trustedCertificateList={"okta-secret"} \
310338
--set customization.authSecretRef=okta-auth-secret \
311339
--set license=true
@@ -352,15 +380,13 @@ In this step, we augment the token with meta-information that is required by the
352380
- In the **General** tab, click **Edit** on the **General Settings** section.
353381
- In the **LOGIN** section, click **+ Add URI** in the **Sign-in redirect URIs** section and add the Decision Center redirect URI you got earlier (`https://<DC_HOST>/decisioncenter/openid/redirect/odm` -- do not forget to replace <DC_HOST> by your actual host name!)
354382
- Repeat the previous step for all other redirect URIs.
355-
- Click **Save** at the bottom of the LOGIN section.
383+
- Click **Save** at the bottom of the **General Settings** section.
356384
357385
![Sign-in redirect URIs](images/Sign-in_redirect_URIs.png)
358386
359387
### Access the ODM services
360388
361-
Well done! You can now connect to ODM using the endpoints you got [earlier](#register-the-odm-redirect-url), and log in as an ODM admin with the account you created in [the first step](#manage-groups-and-users).
362-
363-
>Note: Logout in ODM components using Okta authentication raises an error for the time being. This is a known issue. We recommend you to use a private window in your browser to log in, so that logout is done just by closing this window.
389+
Well done! You can now connect to ODM using the endpoints you got [earlier](#register-the-odm-redirect-urls), and log in as an ODM admin with the account you created in [the first step](#manage-groups-and-users).
364390
365391
### Set up Rule Designer
366392
Loading
-54.9 KB
Loading

0 commit comments

Comments
 (0)