Skip to main content
Version: On prem: 15.0.0

Configure OKTA with Open ID Connect

DISCLAIMER


This page contains third-party references. We strive for our content to always be up-to-date, however, the content referring to external vendors may change independently of Omada. If you spot any inconsistency, please report it to our Helpdesk.

To configure OKTA with Open ID Connect:

  1. Log in to the OKTA Administration page and select Applications.

  2. As Omada is currently not in the pre-configured Okta listings, create a new Application.

  3. In the Create a new app intergation window:

    • select OIDC – OpenID Connect as a sign-in method,

    • select Web Application as an application type.

  4. Click Next.

  5. In the New Web App Integration window, in the General settings section, provide information for the following, mandatory settings:

    • Provide the App integration name.

    • In the Grant type field, in the Client acting on behalf of a user setting, select the Implicit (hybrid) checkbox.

    • In the Sign-in redirect URIs field, specify the URL to the logon.aspx page in the Omada Identity Portal, for example, https://youromadasite.omada.cloud/logon.aspx.

    • In the Sign-out redirect URIs, specify the URL to the logoff page, for example, https://youromadasite.omada.cloud/logoff.aspx.

    note

    In the Assignments section, you can specify how you want to assign Omada to your users.

  6. In the Login section, fill in the following information:

    • In the Login initiated by field, select the Either Okta or App option.

    • Configure the Application visibility options as needed for your environment.

    • In the Login flow field, select the Redirect to app to initiate login (OIDC Compliant) option.

    • Specify the Initiate login URI, for example, https://youromadasite.demo.cloud/logon.aspx.

  7. Click Save.

  8. Next, save the OKTA generated information, such as Client Credentials and Client Secrets information.

Then, proceed to the next section to configure settings in Omada.

Omada configuration

  1. Log in to the Omada portal, that is, https://portal.omada.cloud.

  2. To configure the created environment, in the Actions column, select the Configure option.

  3. Click on the ellipse icon in the top right corner and click Copy JSON Configuration – this contains all of the Cloud settings including the Authentication tab.

    • Save the JSON for backup.

  4. In the Authentication tab, fill in the following information:

    • Provide the User name.

      • This will become the initial user of the solution. User name must match the logon for SSO.
    • Provide the Email address.

      • This is the email address that Omada cloud will send the notifications to. It doesn't have to match the User Name.
    • In the Authentication type field, select the OpendID Connect.

    • Select Okta as a Provider.

    • In the Client ID field, provide the Client ID generated by Okta.

    • Provide the Okta Base URL, for example, something.oktapreview.com.

      • This example uses an Okta test site for this URL.
    • In the OpenID Claim Types field, provide the following claim types:

      • email,upn,given_name,preferred_username,azp,sub
    • Provide the Logoff URL, for example, https://yourcloudname.omada.cloud/logoff.aspx.

    note

    Some configuration options are auto generated by Omada and are labelled as such.

  5. Click the Apply button to save your changes.