IdP Setup: Okta

What

Starting with FileWave Version 14.2.0, we can use Okta for authentication from FileWave. We must create a new application in the Okta Portal and give FileWave access to it. 

When/Why

This configuration is required if you want to use Okta for authentication during device enrollment or during login to the FileWave Web and Native administrator consoles.

How

Okta Admin UI
The UI may look different depending on if you are using a Trial Okta organization or the regular, non-Trial version of the Okta.

Part 1: Login to the Okta Admin Portal

Okta Admin Portal

Begin by logging in to the Okta Admin Portal with an administrator's account. (https://example-admin.okta.com/admin)

Part 2: Create an Okta Application in the Okta Admin Portal

Create an Okta Application Integration in Okta Admin Portal

Now we are going to create an Okta application for FileWave to talk to and assign some rights to it.

  1. First, open the Okta Admin > Menu > Applications > Applications menu and click the Create App Integration button.

    Screenshot 2024-05-20 at 11.26.51 AM.png

  2. Next, select OIDC - OpenID Connect for the Sign-in method.
    1. Select Web Application for the Application Type.
    2. Click the Next button.

      Screenshot 2024-05-20 at 11.38.02 AM.png


  3. Next, configure your Application on the New Web App Integration page you've been redirected to.
    1. Input a meaningful name in the App integration name field.
    2. Click the Add URI button for the Sign-in redirect URIs setting.
      1. Input all of your FileWave Server's redirect URIs in the Sign-in redirect URIs setting.

        Login Redirect URIs for FileWave are displayed in the FileWave Web Admin Settings. (Login to Web Admin > Select "⚙' [Gear/Settings Icon] in top right > Identity Provider > Setup Okta > Get URLs)

        Login Redirect URIs are unique to your server, but will look something like the following:

        https://fwxserver.example.com:443/api/auth/login_via_idp_redirect
        https://fwxserver.example.com:443/api/auth/login_via_idp_redirect_for_native 
        https://fwxserver.example.com:443/api/auth/login_via_idp_redirect_for_device 

    3. Under Assignments, choose whether you want to limit access to specific groups or integrate all users in the organization.
  4. Click the Save button to create the Okta App integration.