Follow these steps to configure Okta for Verax:
Register the application
In the Okta Admin Console, go to Applications > Applications > Create App Integrations
Choose OIDC — Open ID Connect
Select Web Application
Click Next
Enter:
Application name: Verax
Sign-in redirect URI:
https://internal.verax.ai/oidc/callbackUnder Assignments / Controlled access:
Select Allow everyone in your organization
Enable Immediate access
Click Save
After the app is created, copy the Client ID and Client Secret
Add API permissions
In the Okta Admin Console, go to Applications > Verax > Okta API Scopes
Add the following scopes:
okta.users.read
okta.groups.read
Click Save
Get the Issuer URL
In the Admin Console, go to Security > API > Authorization Servers
Choose the authorization server you’ll use (usually default) and copy the Issuer URI, for example: https://{yourOktaDomain}/oauth2/default
Configure an access policy for the app
In the Admin Console, go to Security > API > Authorization Servers
Select the authorization server you’re using and create a policy.
Click Add Policy
Name: Allow OIDC for Verax
Assign to the Verax application
Create rule under the policy:
Click Add Rule
Name: Allow Authorization Code
Grant types:
Authorization Code
Client Credentials
Apply to: Any user
Access: Allow
Save the rule and policy.
Complete the connection in Verax
From Okta, copy:
Issuer URL
Client ID
Client Secret
Paste these values into Verax to complete the Okta connection.