Okta Integration
Last updated
Last updated
© 2024 Fiddler Labs, Inc.
These instructions will help administrators configure Fiddler to be used with an existing Okta single sign on application.
First, you must create an OIDC based application within Okta. Your application will require a callback URL during setup time. This URL will be provided to you by a Fiddler administrator. Your application should grant "Authorization Code" permissions to a client acting on behalf of a user. See the image below for how your setup might look like:
This is the stage where you can allow certain users of your organization access to Fiddler through Okta. You can use the "Group Assignments" field to choose unique sets of organization members to grant access to. This setup stage will also allow for Role Based Access Control (i.e. RBAC) based on specific groups using your application.
Once your application has been set up, a Fiddler administrator will need to receive the following information and credentials:
Okta domain
Client ID
Client Secret
Okta Account Type (default or custom)
All of the above can be obtained from your Okta application dashboard, as shown in the pictures below:
You can also pass the above information to your Fiddler administrator via your okta.yml file.
Step 1 Create a <secret-filename>.yaml
file with the following template
📘 All the values must be base64 encoded
In mac you can run
echo -n "string to be encoded" | base64
to get the encoded value
📘 Do not use doubles quotes
Don’t use doubles quotes anywhere in values in above yaml. In above example, it is written set to “true” - the value is true and not “true”.
Step 2 Update the k8s secret in the namespace of that cluster using the above file.
Step 3 Update the Helm variable fiddler.auth.sso.provider
and fiddler.auth.sso.azuread.secretName
with azuread
and fiddler-sso-azuread-credentials
value. If you are using the helm values file, use the following settings.
📘 Once the deployments are updated, the new SSO settings will be applied.
Once a Fiddler administrator has successfully set up a deployment for your organization using your given Okta credentials, you should see the “Sign in with SSO” button enabled. When this button is clicked, you should be navigated to an Okta login screen. Once successfully authenticated, and assuming you have been granted access to Fiddler through Okta, you should be able to login to Fiddler.
NOTES:
To be able to login with SSO, it is initially required for the user to register with Fiddler Application. Upon successful registration, the users will be able to login using SSO.
The only information Fiddler stores from Okta based logins is a user’s first name, last name, email address, and OIDC token.
Fiddler does not currently support using Okta based login through its API (see fiddler-client). In order to use an Okta based account through Fiddler's API, use a valid access token which can be created and copied on the “Credentials” tab on Fiddler’s “Settings” page.
Need help? Contact support.