Skip to main content

Integrating Okta for Single Sign-On (SSO)

This guide explains how to create an Okta OIDC Web Application for SSO with the RHL ASM Platform.

Prerequisites

  • You have Admin access to your Okta tenant.

Create an OIDC Web Application in Okta

  1. Sign in to the Okta Admin Console.
  2. Go to Applications > Applications.
  3. Click Create App Integration.
  4. Under Sign-in method, choose OIDC - OpenID Connect.
  5. Under Application type, choose Web Application.
  6. Click Next.
  7. In App integration name, enter a recognizable name (for example, RedHunt Labs ASM Platform).
  8. In Sign-in redirect URIs, add the following redirect URI https://app-nvadr.eu.auth0.com/login/callback
  9. In Sign-out redirect URIs remove the default URI.
  10. Keep grant type as Authorization Code (default for web apps).
  11. Under Assignments, choose your access model:
    • Allow everyone in your organization to access, or
    • Limit access to specific groups/users.
  12. Click Save.

Collect Required Values from Okta

After creating the app, collect the following details from Okta:

  • Client ID
  • Client Secret
  • Okta Domain (see image below)

Share the above values with RedHunt Team.

Additional Okta App Settings

After sharing the required values, complete the following settings in your Okta app:

  1. Open the app you created in Okta.
  2. Go to General > General Settings and click Edit.
  3. Under Login initiated by, change the value to Either Okta or App.
  4. In Initiate login URI, enter the URI provided by the RedHunt team after the Client ID and Client Secret are shared with them.
  5. Go to the Assignments section and assign the app to required users/groups.

Optional Okta App Settings

  • Add an app logo for better user visibility in the Okta dashboard.
  • Download the official RedHunt Labs logo from the Media Kit page and upload it in Okta app settings: https://redhuntlabs.com/media-kit/