Skip to main content

Connect your Okta Account

Support avatar
Written by Support
Updated over 4 months ago

In order to connect Okta to Tulip, you can either:

  • Connect using API token

  • Connect via OAuth

To get to the application connection screen, go to the Applications view, then click the "Connect new application" button in the top right. Enter an app connection name (e.g. Okta Production), click next, then choose Okta.

API Token Authentication

  1. Obtain an API Token using a user with super administrator privileges from https://your-subdomain.okta.com/admin/access/api/tokens

  2. In the application credentials screen, provide:

    1. Your Okta Base URL (remove -admin part), e.g. https://your-subdomain.okta.com/)

    2. The token you created in step 1

OAuth Authentication

In order to connect to Okta using OAuth, you need to set up an OIDC application in your Okta tenant.

Certain elements can't be fetched when connecting with OAuth, such as Group Push and certain Settings (See "Types that can't be fetch" for the full list). To fetch these, use API Token authentication.

Using Tulip's OAuth integration

To streamline the connection process, it's recommended to use Tulip's pre-built integration via the Okta Integration Network. The application is assigned with the required scopes by Tulip.

  1. Add Tulip's OAuth App - In your Okta tenant, go to the application tab, browse the OIN catalog and search for "Salto Okta Adapter OAuth".

  2. Assign Users or Groups - Assign users / groups to the created application.
    ​
    πŸ’‘ Important Ensure that the user selected for the initial OAuth login has a super administrator role.
    πŸ’‘ Important Verify the user that will be used to connect Tulip is assigned to a group with access to the application.

  3. Connect to Tulip -

    1. In Okta, go to the application's "Sign On" tab, and copy the Client ID and Client Secret.

    2. In Tulip, choose "OAuth" as the authentication method and provide the Client ID and Client Secret you copied from the previous step

Using custom OAuth integration

If you wish to adjust the scopes granted to Tulip, you can create a custom OIDC application within your Okta tenant. However, be aware that modifying scopes may hinder Tulip's ability to fetch and deploy certain resources.
For detailed instructions on creating a custom OAuth integration, refer to the following guide: Creating a custom OAuth integration for Okta Adapter.

Types that can not be fetched with OAuth

  • EmailNotifications (settings)

  • EndUserSupport (settings)

  • ThirdPartyAdmin (settings)

  • EmbeddedSignInSuppport (settings)

  • SignOutPage (settings)

  • BrowserPlugin (settings)

  • DisplayLanguage (settings)

  • Reauthentication (settings)

  • GroupPush

  • GroupPushRule

OAuth required scopes

okta.orgs.manage
okta.apps.manage
okta.authenticators.manage
okta.authorizationServers.manage
okta.behaviors.manage
okta.brands.manage
okta.deviceAssurance.manage
okta.domains.manage
okta.eventHooks.manage
okta.features.read
okta.groups.manage
okta.idps.manage
okta.inlineHooks.manage
okta.networkZones.manage
okta.policies.manage
okta.profileMappings.manage
okta.rateLimits.manage
okta.roles.manage
okta.schemas.manage
okta.templates.manage
okta.trustedOrigins.manage
okta.userTypes.manage
okta.users.read
okta.emailDomains.manage
okta.linkedObjects.manage

Could not display content

Did this answer your question?