Integration model
Authentication
The functionality is directly embedded in the Zeus authentication management microservice; it is enabled and configured through that microservice's configuration file.
Authentication configuration
The different authentication providers used are configured in the security.authentication.oidc.providers property. In the case of OKTA, the following properties must be completed:
security:
authentication:
oidc:
providers:
okta:
# Nombre del proveedor tal y como aparecerá en la página de inicio de sesión
name: OKTA
# URL del proveedor para autorizar a los usuarios del Portal Anjana (usar variables en la URL)
authorize-url: https://anjanadata.okta.com/oauth2/default/v1/authorize?client_id=${security.authentication.oidc.providers.okta.client-id}&response_type=code&response_mode=query&scope=${security.authentication.oidc.providers.okta.scopes}&redirect_uri=${security.authentication.oidc.providers.okta.redirect-uri}
# URL del proveedor para autorizar a los usuarios de Portuno (usar variables en la URL)
authorize-url-portuno: https://anjanadata.okta.com/oauth2/default/v1/authorize?client_id=${security.authentication.oidc.providers.okta.client-id}&response_type=code&response_mode=query&scope=${security.authentication.oidc.providers.okta.scopes}&redirect_uri=${security.authentication.oidc.providers.okta.redirect-uri-portuno}
# URL del proveedor para gestionar la creación del token
token-url: https://anjanadata.okta.com/oauth2/default/v1/token
# Alcance de la autenticación del proveedor
scopes: openid profile email
# Identificador del cliente de autenticación en el proveedor
client-id: xxxxxxxxxxx
# Secreto del cliente de autenticación en el proveedor
client-secret: xxxxx
# Método de autenticación del proveedor
client-authentication-method: POST
# URI a la que el navegador debe redirigir tras un inicio de sesión exitoso con el proveedor en el Portal Anjana
redirect-uri: https://<host>:<port>/authorized
# URI a la que el navegador debe redirigir tras un inicio de sesión exitoso con el proveedor en el portal administrativo (Portuno)
redirect-uri-portuno: https://<host>:<port>/configpanel/authorized
# Campo donde se encuentra el nombre de usuario en el proveedor
username-claim: email
# Tipo de proveedor
type: OKTA
Requirements
Application registration
The functionality is directly embedded in the Zeus authentication management microservice; it is enabled and configured through that microservice's configuration file.
Below is shown how to create an Okta integration for Anjana Data. An integration represents the application within the Okta organization. The integration includes configuration information required by Anjana to access Okta.
To manually configure the integration once inside the Okta organization, it is necessary to:
-
Click on Create application integration.
-
Select a sign-in method of OIDC-OpenID Connect.
-
Select a web application type (Note: if an incorrect application type is chosen it can interrupt sign-in or sign-out flows by requiring client-secret verification, something public clients do not have).
Enter an Application integration name (Anjana).
(Note: The authorization code is selected as default and cannot be edited, as it is a mandatory type for Grant type).
-
Enter the Sign-in redirect URI: https://<host>:<port>/authorized
-
Enter the Sign-out redirect URI: https://<host>:<port>/logout