IdP Setup: Okta
What
Starting with FileWave Version 14.2.0, we can use Okta for authentication from FileWave. We must create a new application in the Okta Portal and give FileWave access to it.
When/Why
This configuration is required if you want to use Okta for authentication during device enrollment or during login to the FileWave Web and Native administrator consoles.
How
Okta Admin UI
The UI may look different depending on if you are using a Trial Okta organization or the regular, non-Trial version of the Okta.
Part 1: Login to the Okta Admin Portal
Okta Admin Portal
Begin by logging in to the Okta Admin Portal with an administrator's account. (https://example-admin.okta.com/admin)
Part 2: Create an Okta Application in the Okta Admin Portal
Create an Okta Application Integration in Okta Admin Portal
Now we are going to create an Okta application for FileWave to talk to and assign some rights to it.
Next, click the Create New App button to open the Create a New Application Integration dialog.
Next, configure your Application on the Create OpenID Connect App Integration page.
Login Redirect URIs for FileWave are displayed in the FileWave Web Admin Settings.
Login Redirect URIs will look something like the following:
https://fwxserver.example.com:443/api/auth/login_via_idp_redirect
https://fwxserver.example.com:443/api/auth/login_via_idp_redirect_for_native
https://fwxserver.example.com:443/api/auth/login_via_idp_redirect_for_device

Part 3: Configure the Okta App in FileWave
Assign Okta Users and/or Groups to the Okta App Integration
Now we are going to configure the Okta App to connect with FileWave.
Configure an Okta App in the FileWave Web Admin Console
In order for FileWave to communicate with Okta for authentication the Okta App will need to be configured with FileWave.
Open the Identity Provider menu in the FileWave Web Admin Settings
On the Identity Provider menu, click the Okta button or New Identity Provider button in the top right.
Okta Client ID
Open the Okta Admin > Menu > Applications > Okta App > General tab and copy the Client ID value to a secure location.

Okta Client Secret
Open the Okta Admin > Menu > Applications > Okta App > General tab, click the "reveal" button for the Client Secret, and copy the Client Secret value to a secure location.

Okta API Token
Click the Create Token button in the Tokens tab.
Input a meaningful name in the API token's Name field.
Click the Create Token button in the Create Token dialog and copy the API token and store it in a secure location.
Okta API tokens are only displayed to be copied once, make sure to store this token somewhere secure for use in the future.

Okta Domain
Open the Okta Admin > Menu > Applications > Okta App > General tab and copy the Domain value to a secure location.

Only one Identity Provider can be configured for FileWave Device Enrollment authentication.
Only one Identity Provider App instance (Okta, Azure AD, etc.) can be configured with the Admin authentication for each type of Identity Provider.
Login Redirect URLs
In order for Okta authentication to redirect back to FileWave the Login Redirect URLs will need to be configured in the Okta App.

Copy the Login Redirect URLs from the FileWave Web Admin > Settings > Identity Provider > Okta App and paste all the Login Redirect URIs in their own rows.
Click the Save button in the "General Settings" for the Okta App.
Part 4: Configuring and Authenticating with Okta Users
Configure an Okta Identity Provider for Authentication
An Okta App will need to be configured in the FileWave Identity Provider settings for use with FileWave Device enrollment and/or FileWave Admin authentication.
Only one Identity Provider can be configured for FileWave Device Enrollment authentication.
Only one Identity Provider App instance (Okta, Azure AD, etc.) can be configured with the Admin authentication for each type of Identity Provider.

Configure FileWave Admin IdP Groups
Authenticate with Okta during FileWave Device Enrollment
Login with Okta for FileWave Native or Web Admin Console

