Okta Integration
Last updated
Was this helpful?
Last updated
Was this helpful?
These instructions will help administrators configure Fiddler for use with an existing Okta single sign-on application.
To start, create an OIDC-based application in Okta. During the setup process, you will need to provide a callback URL, which will be supplied by your Fiddler services team. Make sure your application is configured to grant "Authorization Code" permissions for a client that acts on behalf of a user. Refer to the image below for an example of how your setup may appear:
At this point grant access to Fiddler for specific users within your organization through Okta. Use the "Group Assignments" field to select distinct groups of organization members who require Fiddler access. Additionally, this setup stage supports Role-Based Access Control (RBAC), enabling you to manage access based on designated groups within your application.
Once your application has been set up, your Fiddler services team requires the following details to complete the integration:
Okta domain
Client ID
Client Secret
Okta Account Type (default or custom)
This information can be accessed from your Okta application dashboard, as illustrated in the images below.
Another option for providing this information to your Fiddler services team is by sharing your okta.yml file.
Step 1 Create a <secret-filename>.yaml
file with the following template
📘 All the values must be base64 encoded
On Mac OS X you can run
echo -n "string to be encoded" | base64
to get the encoded value
📘 Do not use doubles quotes
Don’t use doubles quotes anywhere in values in above yaml. In above example, it is written set to “true” - the value is true and not “true”.
Step 2 Update the Kubernetes secret in the namespace of that cluster using the above file.
Step 3 Update the Helm variable fiddler.auth.sso.provider
and fiddler.auth.sso.azuread.secretName
with azuread
and fiddler-sso-azuread-credentials
value. If you are using the helm values file, use the following settings.
📘 Once the deployments are updated, the new SSO settings will be applied.
Once an administrator has successfully created a deployment for your organization using your Okta credentials, you should see the “Sign in with SSO” button enabled. You should be able to navigate to an Okta login screen when you click this button. Once successfully authenticated, and assuming you have been granted access to Fiddler through Okta, you should be able to log in to Fiddler.
NOTES:
To log in using SSO, users must first register with Fiddler using the invitation link provided by their Fiddler Org Admin unless an Authorization automation process has been configured to auto-provision users on first SSO login. Check with your Fiddler services team for more details.
The information Fiddler stores for Okta-based logins is a user’s first name, last name, email address, and OIDC token.
Fiddler does not support using Okta authentication directly with Fiddler APIs. A valid access token is required which can be created and copied from the “Credentials” tab on Fiddler’s “Settings” page.