Introduction
This guide provides step-by-step instructions for integrating Okta with Limio for authentication purposes. By completing this setup, you can enhance your system's security and streamline user authentication. This guide assumes you have admin-level access to both Okta and Limio.
Prerequisites
Before you begin, ensure you have the following:
- Admin access to your Okta Developer Console.
- Access to the Limio platform with appropriate permissions to modify authentication settings.
- The following information prepared:
- Your Okta domain.
- Redirect URIs required for Limio.
Okta Configuration
-
Access Your Okta Developer Console
- Log in to Okta Developer Console.
-
Create a New Application
- Navigate to Applications > Applications > Create App Integration.
- Choose OIDC - OpenID Connect as the sign-in method.
- Select Web Application and click Next.
-
Set Up Application Settings
- Configure the following:
-
Sign-in redirect URIs:
https://{tenant}-shop.prod.limio.com/api/sf
-
Sign-out redirect URIs:
https://{tenant}-shop.prod.limio.com/api/sf/logout
-
Sign-in redirect URIs:
- Click Save to complete the setup.
- Configure the following:
-
Retrieve Integration Credentials
- Note down the following:
- Client ID
- Client Secret
-
Issuer URL (e.g.,
https://{okta-domain}/oauth2/default
)
- Note down the following:
Limio Configuration
-
Access Limio Authentication Settings
- Log in to Limio and navigate to Settings > Authentication > OpenID Connect.
-
Add a New Authentication Provider
- Configure the following:
-
Provider Name: A unique name to identify the provider, e.g.,
okta-test-dev-shop.prod.limio.com
. - Issuer Name: The Issuer URL from Okta.
- Client ID: As provided by Okta.
- Client Secret: As provided by Okta.
-
JWKS URI:
https://{okta-domain}/oauth2/default/v1/keys
-
Authorization Endpoint:
https://{okta-domain}/oauth2/default/v1/authorize
-
Token Endpoint:
https://{okta-domain}/oauth2/default/v1/token
-
Logout Endpoint:
https://{okta-domain}/oauth2/default/v1/logout
- Token Endpoint Type: Basic
-
Scope:
openid profile email
-
Provider Name: A unique name to identify the provider, e.g.,
- Configure the following:
-
Save and Test the Configuration
- Save the changes and test the authentication flow to ensure proper integration.
Conclusion
You have now configured Okta as an authentication provider for Limio. For further assistance or troubleshooting, refer to the Okta Integration Guide or contact Limio Support.
Comments
0 comments
Please sign in to leave a comment.