Follow these steps to configure OAuth2 authentication for SCIM provisioning in
Okta.
About this task
Okta supports OAuth2 as an authentication method for SCIM provisioning. This section explains how
to set up OAuth2 integration between Okta and Faspex.
Procedure
-
In Okta, go to Provisioning > Integration and
set the Authentication Mode to OAuth2.
-
Enter the following values in Okta:
- Access token endpoint URI:
https://{your_faspex_domain}/aspera/faspex/auth/token/
- Authorization endpoint URI:
https://{your_faspex_domain}/aspera/faspex/auth/authorize
-
To generate the Client ID and Client Secret, log in to the Faspex UI and follow these
steps:
-
Go to Admin > Configurations >
API Clients.
-
Click Create New.
-
Enter a name for the API client.
-
Enable the following options:
- Enable JWT grant type
- Allow refresh token
-
Add the following redirect URIs:
https://system-admin.okta.com/admin/app/cpc/{appName}/oauth/callback
https://system-admin.okta-emea.com/admin/app/cpc/{appName}/oauth/callback
https://system-admin.oktapreview.com/admin/app/cpc/{appName}/oauth/callback
https://system-admin.trexcloud.com/admin/app/cpc/{appName}/oauth/callback
-
Set the Access token and Refresh token expiration times to 7 days for both.
-
Click Create to generate the Client ID and Client Secret.
-
Back in Okta, use the generated Client ID and Client Secret to fill in the corresponding
fields.
-
Click Save in Okta.
-
Click Test Connector Configuration to verify that the authentication
works as expected.