Setting up Yotascale SSO to use OKTA OpenID
How to setup Yotascale SSO with Okta using Okta OpenID
Currently Yotascale provides support for Google Auth, SAML (through Okta or Ping Identity) or Okta OpenID authentication in addition to username/password logins. Google Auth can be used alongside any 1 of the other Authentication Providers. Adding SAML or OpenID will override the username/password authentication. This guide focuses on setting up Okta as your IdP using Yotascale's Okta OpenID authentication provider.
Yotascale - Retrieve OpenID auth data:
Login to Yotascale with a user that has Admin role access
Go to the Settings Menu
Under Users and Permissions select Manage Auth Providers
Select "+ New Provider"
Select Okta OpenID
Enter an Organization name
At bottom of page copy and save the Redirect URL:
https://login.yotacale.io/login/callback
Leave this page open
Okta - Create Application
Login to Okta
Select Application Tab
Select "Create App Integration"
In the popup view select “OIDC - OpenID Connect”
And then select "Web Application" and click “Next”
For App Integration Name enter a name: example: “Yotascale OIDC”
For Sign-in redirect URIs enter the saved Redirect URL copied from Yotascale
Select “Allow everyone in your organization to access” to allow Yotascale for all users in your domain or “Limit access to selected groups” if you want only certain users to have access
NOTE: Yotascale allows you to control what users can see in the app through Role Based Access Control so limiting access to the app is often unneeded
Select "Save"
You should now be in the Client Credentials window
Copy and save the Client ID
Copy and save the Client secret
Yotascale - Complete Okta OpenID Auth Provider configuration
You should still be logged in and on the Okta OpenID Auth Provider configuration page
If not, login again to Yotascale with a user that has Admin role access
Follow the same steps to add new OpenID Auth provider as describe above.
Make sure to add the same Organization name for OpenID
Enter the following information:
Organization name already entered
Okta Domain URL -Add your Okta Domain here
Client ID - Enter the Client ID that was copied from the Okta application
Client Secret - Enter the Client Secret that was copied from the Okta application
Tenant Domain - enter the domain name of your users. If you have more than one domain, you will need to configure a separate Auth Provider for each one.
Auto Provisioning
Make sure this is Enabled - When user authenticates through Okta, the user account will automatically be created in Yotascale User list.
Active - Make sure this is Enabled, if it is disabled this Auth Provider will not be used at login.
Default Group - when a user first logs into Yotascale, they will be automatically added to this User Group
Select “Add Auth Provider”
Configuration is now complete and users should be able to login via Okta successfully.
If you run into any issues, please contact our support team.