Info |
---|
Okta specifications. |
Creation order:
Scopes
Claims
Clients
...
Application Name
...
Type
...
Following the OAuth 2.0 standard, ModelOp Center requires the following Okta configurations for a successful integration:
Custom scope
modelop_client
Applications
gateway-service
internal-client
external-integration-client
go-cli
Proposed | Application | Client Secret Required | Grant Type | Scope |
---|
Redirect URIs | |
---|---|
gateway-service |
WebApp
Web | ✔ |
|
Note: Refresh token behavior - Use persistent token.
|
|
custom_scope
|
email
family_name
given_name
groups
Sign-in redirect URIs
|
Sign-out redirect URIs |
|
internal-client |
API
✔ |
|
|
email
family_name
given_name
idtyp
external-integration-client |
Native |
|
|
modelop_client
|
family_name
given_name
groups
|
|
go-cli |
modelop_client
Native | ✔ |
✔
Password
|
|
family_name
given_name
groups
|
ModelOp Center URL as a trusted origin
For users to be redirected to ModelOp Center after login, the ModelOp Center URL has to be added as a trusted origin by following these steps:
Open the Okta console
Click the following tabs in the given order:
Security
API
Trusted Origins
Add origin
Origin name: ModelOp Center
Origin URL: <ModelOp Center URL>
Choose Type:
Cross-Origin Resource Sharing (CORS)
Redirect
Required User Attributes
Family name
Given name
User name
Email
Group(s)
Okta Guide
For instructions on how to create the custom modelop_client
scope, please follow the Okta: How to guide.