Okta OIDC

Overview

The Okta SSO integration with Akto provides a centralised way to authenticate users through your existing identity provider. Akto leverages OpenID Connect (OIDC) to verify user identities and apply access controls based on identity attributes and group memberships.

With this integration, authentication and authorisation can be managed directly in Okta, while Akto handles role-based access enforcement during user login.

Configure Okta Account for Akto SSO

You can set up Okta SSO along with role mapping in a unified flow that links Okta identities, group claims, and Akto’s role enforcement.

1

Create Okta Application for Akto

  1. Open your Okta Admin Console and go to Applications. Click on Create App Integration.

  2. Under Sign-in Method, select OIDC - OpenID Connect. Choose Web Application as the application type.

  3. Provide the name Akto in App integration name.

  4. Add the following under Sign-in redirect URIs: https://app.akto.io/authorization-code/callback

  5. If using Okta-initiated login, include this under Initiate login URI: https://app.akto.io/okta-initiate-login?accountId=<your-akto-accountId>

  6. Assign the application to the necessary users or groups. Save the configuration.

  7. Copy the CLIENT_ID and CLIENT_SECRET from the created application.

circle-info

Replace your-akto-accountId in step 5 with your actual account ID, which you can find in Akto settingsarrow-up-right.

2

Configure Authorisation Server for Group Claims

Update your Okta authorisation server to include a groups claim in the access token.

If your organisation already uses Okta groups for access control, you can reuse them. Create new groups only if you need separate access definitions for Akto.

Refer to Okta documentationarrow-up-right for guidance on group creation.

Group claims enable Akto to determine user roles based on their group memberships.

3

Generate Okta API Token

Navigate to:

  • Security → API → Tokens

  • Generate a new token

  • Assign a name to the token

  • Set IP restrictions to: Any IP

circle-info

Note

Providing a valid Okta API token allows Akto to automatically fetch available group names. This simplifies the mapping process and minimizes manual configuration errors.

Copy and store the generated API token.

circle-check

API Access Management in Okta

Setup Okta SSO in Akto Dashboard

Follow these steps within the Akto dashboard:

1

Go to Integrations → Okta SSO in the Akto dashboard.

2

You will see the same Setup Okta SSO in Akto Dashboard steps here as well. Click Next to continue.

3

Provide the following details:

  • Client ID: Client ID from the Okta application

  • Client Secret: Client secret from the Okta application

  • Authorisation Server ID: Identifier of the Okta authorisation server

  • Domain Name: Your Okta domain (e.g., your-org.okta.com)

  • API Token: Generated Okta API token

4

Submit the configuration to activate SSO.

Configure Group-to-Role Mapping in Akto

Once SSO is enabled, define how Okta groups correspond to Akto roles.

1

Navigate to Group mapping & API access and click Edit.

2

Enter the exact Okta group name in Okta group name.

circle-info

The group name must exactly match the value present in the access token or returned via the Okta API.

3

Select the appropriate role in Akto role, such as Admin, Security Engineer, Developer, or Guest.

4

Click Add to create the mapping.

Each Okta group can be linked to only one Akto role, and each role can be assigned once.

5

Repeat the steps for any additional group mappings.

6

If group claims are missing from the access token, provide the Management API token in the same section.

7

Save your changes.

Role Assignment During Login

During user authentication, Akto evaluates group memberships and assigns roles based on the configured mappings.

  • Okta groups define access levels

  • Akto roles control permissions within the platform

  • The API token supports fallback group retrieval when needed

This setup enables centralized identity management in Okta while ensuring consistent authorisation enforcement within Akto.

Last updated