Select ‘OIDC - OpenID Connect’ as the Sign-in method,
Select’Web Application’ as the Application type and click ‘Next’
At this point you should be redirected to a new web app integration page. Here you can name your app integration (we recommend to use “Bright Data Control Panel” name).
At ‘Grant type’ select Implicit along with Authorization Code
Paste it to according field in New App setup in OKTA
Repeat the same for “Sign-out URI”
At ‘Assignments’, select an access level as you want
Click ‘Save’
Now, you should land on your new app integration settings page.
Copy your Client ID, Client Secret, and Okta domain to OKTA setup dialog in your Bright Data Control Panel.
Click “Activate”.
Skip step 16 if you selected “Allow everyone to access”
Go to “Assignments” tab and assign users allowed to use this integration
Go to Bright Data Settings page and make sure all required users presented.
We’re working on users provisioning support, at the moment - you should manage it manually.The following steps are optional. They are for enabling your users to launch authentication from their dashboard or the Okta Chrome extension.
Scroll down to ‘General Settings’ and click Edit
Set these settings:
Login initiated by: Either Okta or App
Application visibility: Display application icon to users
Login flow: Redirect to app to initiate login (OIDC Compliant)
Copy Initiate login URI from Control Panel
Save changes. Now the integration is ready to work.
Notes
Okta Domain should be the one that appears in your app integration settings (yourcompany.okta.com), NOT the one you are seeing as an admin (yourcompany-admin.okta.com)
Make sure the Credentials provided to Bright Data are correct, we cannot check them on our side.
- Sign-in Redirect URI is a must in order to make the SSO feature work correctly
- Initiate login URI is needed if the you wants to be able to use the feature from the Okta Chrome extension or the Okta dashboard