Skip to main content
Version: On prem: 15.0.1

Configure OKTA with Open ID Connect

DISCLAIMER


This page contains third-party references. We strive for our content to always be up-to-date, however, the content referring to external vendors may change independently of Omada. If you spot any inconsistency, please report it to our Helpdesk.

To configure OKTA with Open ID Connect:

  1. Log in to the OKTA Administration page and select Applications.

  2. As Omada is currently not in the pre-configured Okta listings, create a new Application.

  3. In the Create a new app integration window:

    • select OIDC – OpenID Connect as a sign-in method,

    • select Single-Page Application as an application type.

  4. Click Next.

  5. In the New Web App Integration window, in the General settings section, provide information for the following, mandatory settings:

    • Provide the App integration name.

    • In the Grant type field, in the Client acting on behalf of a user setting, select the Authorization code checkbox.

      info

      Omada recommends using the Authorization Code Flow for obtaining authorized access.

      However, if you prefer to employ the Implicit Flow, select the Implicit (hybrid) and Allow ID token with implicit grant type option.

    • In the Sign-in redirect URIs field, specify the URL to the logon.aspx page in the Omada Identity Portal, for example, https://youromadasite.omada.cloud/logon.aspx.

    • In the Sign-out redirect URIs, specify the URLs to the logoff page, for example, https://youromadasite.omada.cloud/logoff.aspx?LANG=1000 and https://youromadasite.omada.cloud/logoff?LANG=1001.



      info

      When configuring the Okta OpenID Connect Application, ensure that you include the LANG=<Language ID> parameter in the Sign-out redirect URIs. This parameter should contain the ID for any language you anticipate users will use, for example:

      • https://localhost/logoff.aspx?LANG=1000
      • https://localhost/logoff.aspx?LANG=1001
    note

    In the Assignments section, you can specify how you want to assign Omada to your users.

  6. In the Login section, fill in the following information:

    • In the Login initiated by field, select the Either Okta or App option.

    • Configure the Application visibility options as needed for your environment.

    • In the Login flow field, select the Redirect to app to initiate login (OIDC Compliant) option.

    • Specify the Initiate login URI, for example, https://youromadasite.demo.cloud/logon.aspx.

  7. Click Save.

  8. In the Proof Key for Code Exchange (PKCE) field, select the Require PKCE as additional verification option.

  9. Next, save the OKTA generated information, such as Client Credentials and Client Secret information.

Omada Identity on-premises configuration on-prem

For the Omada Identity on-premises solution, configure the following setting:

  1. In the ResponseType column, in tblCustomerAuth table, set 1 (one) as a value.

    info

    The ResponseType column in the tblCustomerAuth table determines which response_type value is sent in the OpenID Connect authorization request.

    • 0 indicates the id_token type, facilitating Implicit Flow. For more information, refer to the OpenID documentation.

    • 1 indicates the code type, enabling the highly secure Authorization Code Flow. For more information, refer to the OpenID documentation.

    The flow used is determined by the response_type value contained in the OpenID Connect Authorization Request.

    When the code response type is used, then, the Proof Key for Code Exchange (PKCE) is enabled. If PKCE is not supported, the code flow is disabled.

Omada Identity Cloud configuration Cloud

For the Omada Identity Cloud solution, configure the following settings:

  1. Log in to the Omada portal, that is, https://portal.omada.cloud.

  2. To configure the created environment, in the Actions column, select the Configure option.

  3. Click on the ellipse icon in the top right corner and click Copy JSON Configuration – this contains all of the Cloud settings including the Authentication tab.

    • Save the JSON for backup.

  4. In the Authentication tab, fill in the following information:

    • Provide the User name.

      • This will become the initial user of the solution. User name must match the logon for SSO.
    • Provide the Email address.

      • This is the email address that Omada cloud will send the notifications to. It doesn't have to match the User Name.
    • In the Authentication type field, select the OpenID Connect.

    • Select Okta as a Provider.

    • In the Client ID field, provide the Client ID generated by Okta.

    • Provide the Okta Base URL, for example, something.oktapreview.com.

      • This example uses an Okta test site for this URL.
    • In the OpenID Claim Types field, provide the following claim types:

      • email,upn,given_name,preferred_username,azp,sub
    • Provide the Logoff URL, for example, https://yourcloudname.omada.cloud/logoff.aspx.

    note

    Some configuration options are auto generated by Omada and are labelled as such.

  5. Click the Apply button to save your changes.