Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
blocks:sso:okta [2019-03-12 10:32] max |
blocks:sso:okta [2024-08-20 12:17] (current) melvin Joao changes |
||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====Okta==== | + | ====Blocks single-sign-on using OKTA==== |
+ | |||
+ | This article describes how to set up Blocks single-sign-on using the popular [[https:// | ||
- Login to your okta account and navigate to the admin pages. | - Login to your okta account and navigate to the admin pages. | ||
- | - Add an application by clicking " | + | - Add an application by clicking " |
- | - Give you application a name and enter " | + | - Give you application a name and enter " |
- | - Click the "Sign On" tab at the top of your application page. Scroll down and press the " | + | - Select |
* {{: | * {{: | ||
- Click on the " | - Click on the " | ||
Line 14: | Line 16: | ||
* BlocksRoleContributor | * BlocksRoleContributor | ||
* BlocksRoleStaff | * BlocksRoleStaff | ||
- | - Click on the " | + | - Click on the " |
- | - At the top, click the "Manage Apps" button and assign | + | - At the top, click the "Applications" button and assign |
- | - Click on the " | + | - Click on the " |
- | - Open your server | + | |
- | < | + | ====Blocks specific steps==== |
- | server: | + | |
- | auth: | + | - Open your Blocks |
- | urlResolver: | + | |
- | ajaxRequestResolver: | + | server: |
- | callbackUrl: | + | type: pixilab_server |
- | rolesOwner: attributes | + | |
- | rolesPath: roles | + | urlResolver: |
- | rolesMapping: | + | ajaxRequestResolver: |
- | BlocksRoleAdmin: | + | callbackUrl: |
- | BlocksRoleManager: | + | rolesOwner: attributes |
- | BlocksRoleCreator: | + | rolesPath: roles |
- | BlocksRoleEditor: | + | rolesMapping: |
- | BlocksRoleContributor: | + | BlocksRoleAdmin: |
- | BlocksRoleStaff: | + | BlocksRoleManager: |
- | clients: | + | BlocksRoleCreator: |
- | - org.pac4j.oidc.client.OidcClient: | + | BlocksRoleEditor: |
- | configuration: | + | BlocksRoleContributor: |
- | discoveryURI: | + | BlocksRoleStaff: |
- | clientId: [CLIENT-ID] | + | clients: |
- | secret: [CLIENT-SECRET] | + | - org.pac4j.oidc.client.OidcClient: |
- | clientAuthenticationMethod: | + | configuration: |
- | scope: openid profile groups | + | discoveryURI: |
- | servlet: | + | clientId: [CLIENT-ID] |
- | security: | + | secret: [CLIENT-SECRET] |
- | - matchers: internalMatcher | + | clientAuthenticationMethod: |
- | clients: OidcClient | + | scope: openid profile groups |
- | authorizers: | + | servlet: |
+ | security: | ||
+ | - matchers: internalMatcher | ||
+ | clients: OidcClient | ||
+ | authorizers: | ||
+ | applicationConnectors: | ||
+ | useForwardedHeaders: | ||
</ | </ | ||
+ | - Start Blocks and go to "/ | ||
- | Start Blocks and go to "/edit" for login. | + | ===Role Mapping=== |
+ | |||
+ | When the roles (through groups) you've added to your Okta configuration does not match the roles used by blocks, as per our description in the section above (step 6). You can add role mapping to the Blocks | ||
+ | < | ||
+ | rolesMapping: | ||
+ | BlocksRoleAdmin: | ||
+ | BlocksRoleManager: | ||
+ | BlocksRoleCreator: | ||
+ | BlocksRoleEditor: | ||
+ | BlocksRoleContributor: | ||
+ | BlocksRoleStaff: | ||
+ | </code> | ||
+ | This mapping is already included in the configuration example, but it can be a good thing to keep in mind if your roles look different from what we configured in step 6 of the section above. |