Okta
Configure Okta for SSO authentication with Parseable
Configure Okta as an identity provider for Parseable using OpenID Connect.
Overview
Integrate Okta with Parseable to:
- Enterprise SSO - Use Okta for authentication
- User Management - Centralized user provisioning
- MFA Support - Leverage Okta's security features
- Compliance - Meet enterprise security requirements
Prerequisites
- Okta organization
- Admin access to Okta
- Parseable instance with OIDC support
Okta Configuration
Create Application
- Log in to Okta Admin Console
- Go to Applications → Applications
- Click Create App Integration
- Select:
- Sign-in method: OIDC - OpenID Connect
- Application type: Web Application
- Click Next
Configure Application
- App integration name: Parseable
- Grant type: Authorization Code
- Sign-in redirect URIs:
https://your-parseable.com/callback - Sign-out redirect URIs:
https://your-parseable.com - Controlled access: Select appropriate option
- Click Save
Get Credentials
- Go to your application's General tab
- Copy:
- Client ID
- Client Secret
- Note your Okta domain (e.g.,
dev-123456.okta.com)
Assign Users
- Go to Assignments tab
- Click Assign → Assign to People or Assign to Groups
- Select users/groups
- Click Done
Parseable Configuration
Environment Variables
P_OIDC_CLIENT_ID=your-client-id
P_OIDC_CLIENT_SECRET=your-client-secret
P_OIDC_ISSUER=https://dev-123456.okta.com
P_OIDC_REDIRECT_URI=https://your-parseable.com/callbackDocker Compose
version: '3.8'
services:
parseable:
image: parseable/parseable:latest
environment:
- P_OIDC_CLIENT_ID=${OKTA_CLIENT_ID}
- P_OIDC_CLIENT_SECRET=${OKTA_CLIENT_SECRET}
- P_OIDC_ISSUER=https://dev-123456.okta.com
- P_OIDC_REDIRECT_URI=https://your-parseable.com/callbackOIDC Endpoints
Okta OIDC endpoints:
| Endpoint | URL |
|---|---|
| Issuer | https://{domain}.okta.com |
| Authorization | https://{domain}.okta.com/oauth2/v1/authorize |
| Token | https://{domain}.okta.com/oauth2/v1/token |
| UserInfo | https://{domain}.okta.com/oauth2/v1/userinfo |
| JWKS | https://{domain}.okta.com/oauth2/v1/keys |
Custom Authorization Server
For custom claims, use a custom authorization server:
P_OIDC_ISSUER=https://dev-123456.okta.com/oauth2/defaultBest Practices
- Use Groups - Manage access with Okta groups
- Enable MFA - Require multi-factor authentication
- Configure Session - Set appropriate session policies
- Audit Logs - Monitor authentication events
Troubleshooting
Login Redirect Loop
- Verify redirect URI matches exactly
- Check client ID and secret
- Verify issuer URL format
User Not Authorized
- Check user is assigned to application
- Verify group assignments
- Check Okta system logs
Next Steps
- Configure OAuth for other providers
- Set up RBAC in Parseable
- Review security best practices
Was this page helpful?