Configuring authentication with Okta

Okta SSO is available for both SaaS and on-premise installs. To set up Okta integration, log in to Okta interface, go to Applications -> Applications and click "Create App Integration" button. In the popup select OIDC option. In the additional menu select "Web Application".
Set sign-in redirect URI, replace the domain name with domain where Datafold app is installed. There is one small difference for SaaS or on-premise installs:
  • For on-premise, the redirect URL should be: https://<install-hostname>/oauth/okta
  • For SaaS, the redirect URL should be<client-id>, where client-id is the Client ID of the configuration. In the first screen, you don't have the client-id yet, but you need update the URL in the screen afterwards.
  • Configure user assignments to the app as needed.
  • On the next screen you'll be presented with Client ID and Client Secret. Copy them.
  • In Datafold app, go to Settings -> Org Settings and fill in the details. If you want to auto-create users that are authorized to use the app, tick the "Autocreate Users" checkbox.
The metadata URI of Okta OAuth server, e.g.: https://<okta-server-name>/.well-known/openid-configuration where okta-server-name is your Okta domain.
Organization admins will always be able to log in with either password or Okta. Other users will be required to log in through Okta once configured.
Last modified 22d ago
Copy link