How to Configure OKTA SSO for APIsec
This setup might fail without parameter values that are customized for your organization. Please use the Okta Administrator Dashboard to add an application and view the values that are specific for your organization.
If you have not yet added the APISec app to your Okta organization please follow the below instructions :
- Sign in to your Okta organization with your administrator account.
- In the Admin Console, go to Applications > Applications.
- Click Browse App Catalog.
- Enter APIsec in the Search... text box
- On the catalog page for the app integration, click Add.
- Enter a label for your copy of this app integration. Click Done to add this to your org.
- On the Assignments tab, click Assign to assign the app integration to any user or group in your org. Click Done when the assignments are complete.
Supported Features :
The APISec Okta SSO integration currently supports the following features:
- IdP-initiated SSO
- JIT (Just In Time) Provisioning
For more information on the listed features, visit the Okta Glossary
Configuration Steps :
-
Sign in to Apisec with the organization Admin account at https://cloud.apisec.ai
-
Click on Configurations Tile
-
Click on SSO Tile Under Integrations and Select SSO Type as OKTA from the Dropdown.
-
Enter Issuer, Client-ID and Sign-In URL.
- Issuer : Copy and paste the following: - In Okta , Issuer URL is the https://your-domain.okta.com
-
Client-ID : Copy and paste the following: - In Okta, select the Sign On tab for the APIsec and copy the Client ID.
-
App Embed Link : Copy and paste the following: - In Okta, select the General tab for the APISec and copy the Embed Link.
-
Click Save.
Notes :
Make sure the URL does not have any extra slash at the end in the issuer field under the SSO Settings tab in APIsec. Using the wrong value will prevent you from authenticating via OIDC to APIsec. Eg: https://your-doman.okta.com