Jump to content

Connect Resco Cloud with Okta: Difference between revisions

From Resco's Wiki
Created page with "{{WIP}} Resco Cloud supports Okta authorization. == Prerequisites == * To set up Okta authorization, you need Resco Cloud version 15.1 or higher..."
 
Marek Rodak (talk | contribs)
No edit summary
 
(15 intermediate revisions by one other user not shown)
Line 1: Line 1:
{{WIP}}
{{Admin TOC}} {{Wikipedia|Okta, Inc.}}
[[Resco Cloud]] supports Okta authorization.
[[Resco Cloud]] supports Okta authentication.


== Prerequisites ==
== Prerequisites ==


* To set up Okta authorization, you need Resco Cloud [[Releases/Summer_2022|version 15.1]] or higher.  
* To set up Okta authentication, you need Resco Cloud [[Releases/Summer_2022|version 15.1]] or higher.  
* To use Okta authorization, the app also must be updated to [[Releases/Summer_2022|version 15.1]] or higher.  
* To use Okta authentication, the app also must be updated to [[Releases/Summer_2022|version 15.1]] or higher.  


== Raw dump TBD ==
== Okta configuration ==


Configure OKTA
Log in to the Okta admin console as an administrator and set up app integrations for the web app and native apps, as well as an authorization server for Resco Cloud.


Web apps  
=== Web apps ===


In the Admin Console, go to Applications > Applications.  
# In the Admin Console, go to '''Applications > Applications'''.
# Click '''Create App Integration'''.
#* As '''Sign-in method''', select '''OIDC - OpenID Connect'''.
#* As '''Application type''', select '''Web Application'''.
#* Click '''Next'''.
# Set up the new app integration:
#* As '''App integration name''', enter a name for your app integration, for example "resco cloud web app".
#* As '''Grant type''', select '''Refresh Token'''.
#* As '''Sign-in redirect URIs''', enter <code>https://<your_server_name>/Authenticate.aspx/ADFS</code>.
#* As '''Sign-out redirect URIs''', enter <code>https://<your_server_name></code>.
# Save all changes.


Click Create App Integration.
=== Native apps ===


To create an OIDC app integration, select OIDC - OpenID Connect as the Sign-in method.  
# In the Admin Console, go to '''Applications > Applications'''.
# Click '''Create App Integration'''.
#* As '''Sign-in method''', select '''OIDC - OpenID Connect'''.
#* As '''Application type''', select '''Native Application'''.
#* Click '''Next'''.
# Set up the new app integration:
#* As '''App integration name''', enter a name for your app integration, for example "resco cloud native apps".
#* As '''Grant type''', select '''Refresh Token'''.
#* As '''Sign-in redirect URIs''', enter <code><nowiki>https://www.resco.net/oauth.html</nowiki></code>.
# Save all changes.


Select Web Application
=== Authorization server ===


Click Next.  
# In the Admin Console, go to '''Security > API'''.
# On the '''Authorization Servers''' tab, either modify the default authorization server or click '''Add Authorization Server''' to add a new one.<br>[[File:Okta add auth server.png|alt=Connect Resco Cloud with Okta: Configuration: Okta add auth server|600px]]
#* As '''Name''', enter a name for authorization server, for example "resco cloud auth server".
#* As '''Audience''', enter <code><nowiki>https://resco.net/rescocloud</nowiki></code>.
# Go to the '''Claims''' tab and click '''Add Claim''':
#* As '''Name''', enter <code>upn</code>.
#* As '''Include in token type''', select "ID Token" and "Always".
#* As '''Value type''', select "Expression".
#* As '''Value''', enter <code>user.email</code>.
#* Click '''Create'''.
# Add another claim:
#* As '''Name''', enter <code>uid</code>.
#* As '''Include in token type''', select "ID Token" and "Always".
#* As '''Value type''', select "Expression".
#* As '''Value''', enter <code>user.id</code>.
#* Click '''Create'''.


In General Settings:  
::[[File:Okta adding claims.png|alt=Connect Resco Cloud with Okta: Configuration: Okta adding claims|600px]]


App integration name: Specify a name for your app integration.
== Connect Resco Cloud to Okta ==


Grant type: select the Refresh Token check box
# Sign in to the Resco Cloud management console using a System Administrator user account.
# Start the Resco Cloud [[Admin Console]].
# Select '''Settings > Organization''' from the menu to edit the properties of your organization.
# In the '''Identity provider''' line, click '''Connect...'''
# Select '''OKTA'''.
# As '''Metadata URL''', enter the URL of your Okta authorization server (e.g., <code><nowiki>https://{your domain}/oauth2/default</nowiki></code>).
# The read-only '''Redirect URI''' is provided for your reference (you need it for Okta configuration).
# Enter the '''Client ID''' and '''Client Secret''' from Okta web app configuration.
# Enter the '''Native Client ID''' from Okta native apps configuration.
# Click '''Connect Now'''.
# You are redirected to the Okta login page. Sign in and you return to the Admin Console with the Okta state set to '''Connected'''.


Sign-in redirect URIs: enter https://<your_server_name>/Authenticate.aspx/ADFS
== Assign Okta users ==


Sign-out redirect URIs: enter https://<your_server_name>
You have to assign Okta users to new or existing users of Resco Cloud.
 
# In the [[Admin Console]], go to '''Resources > Users'''.
# Select an existing user or create a new one.
 
# As the '''Domain Name''', select the Okta login name (by default, this is the email address) of the user who you want to associate with the selected Resco Cloud user.
Native apps
# Click '''Save & Close'''.
 
In the Admin Console, go to Applications > Applications.  
 
Click Create App Integration.
 
To create an OIDC app integration, select OIDC - OpenID Connect as the Sign-in method.
 
Select Native Application
 
Click Next.
 
In General Settings:
 
App integration name: Specify a name for your app integration.  
 
Grant type: select the Refresh Token check box
 
Sign-in redirect URIs: enter https://www.resco.net/oauth.html
 
 
 
 
Authorization server
 
In the Security > API, select the Authorization Servers tab. Then, modify default Authorization Server or click Add Authorization Server 
 
Name : Specify a name for Authorization server
 
Graphical user interface, text, application, email
 
Description automatically generatedAudience – enter https://resco.net/rescocloud
 
 
Graphical user interface, text, application, email
 
Description automatically generatedChoose Claims
 
Choose Add Claim
 
Name :  upn
 
Include in token type : Select Access ID Token. In the second dropdown box, choose Always
 
Value type: Expression
 
Value: user.email  
 
 
 
Name :  uid
 
Include in token type : Select Access ID Token. In the second dropdown box, choose Always
 
Value type: Expression
 
Value: user.id
 
 
Connect your Resco Cloud to OKTA
 
Resco Cloud
 
Sign in to the Resco Cloud management console using a System Administrator user account.
 
Start the Admin Console
 
Select Settings > Organization from the menu to edit the properties of your organization.
 
In the Identity provider line, click Connect....
 
Choose OKTA
 
As Metadata URL, enter the URL to your OKTA Authorization server (e.g. https://{your domain}/oauth2/default )
 
The read-only Redirect URI is provided for your reference (you need it for OKTA configuration).  
 
Enter the Client ID and Client Secret from OKTA Web app configuration
 
Enter the Native Client ID from OKTA Native App configuration


A red text saying '''Inactive''' is displayed next to the '''Domain Name''' until the user logs in for the first time. At that point, the text changes into a green '''Active'''.


== Connect Resco mobile app to Resco Cloud that uses Okta ==
# Tap Synchronize.
# As '''User Mode''' select '''OAuth'''.
# Enter the URL of your organization, usually <code><nowiki>https://{organizationname}.rescocrm.com</nowiki></code>.
# Enter a new password that protects your offline data (twice). This password cannot be recovered so remember it well.
# Tap Synchronize.
# Enter your Okta credentials.


[[Category:Resco Cloud]]
[[Category:Resco Cloud]]

Latest revision as of 09:36, 27 November 2023

Wikipedia logo
Wikipedia has an article on a similar subject:

Resco Cloud supports Okta authentication.

Prerequisites

  • To set up Okta authentication, you need Resco Cloud version 15.1 or higher.
  • To use Okta authentication, the app also must be updated to version 15.1 or higher.

Okta configuration

Log in to the Okta admin console as an administrator and set up app integrations for the web app and native apps, as well as an authorization server for Resco Cloud.

Web apps

  1. In the Admin Console, go to Applications > Applications.
  2. Click Create App Integration.
    • As Sign-in method, select OIDC - OpenID Connect.
    • As Application type, select Web Application.
    • Click Next.
  3. Set up the new app integration:
    • As App integration name, enter a name for your app integration, for example "resco cloud web app".
    • As Grant type, select Refresh Token.
    • As Sign-in redirect URIs, enter https://<your_server_name>/Authenticate.aspx/ADFS.
    • As Sign-out redirect URIs, enter https://<your_server_name>.
  4. Save all changes.

Native apps

  1. In the Admin Console, go to Applications > Applications.
  2. Click Create App Integration.
    • As Sign-in method, select OIDC - OpenID Connect.
    • As Application type, select Native Application.
    • Click Next.
  3. Set up the new app integration:
    • As App integration name, enter a name for your app integration, for example "resco cloud native apps".
    • As Grant type, select Refresh Token.
    • As Sign-in redirect URIs, enter https://www.resco.net/oauth.html.
  4. Save all changes.

Authorization server

  1. In the Admin Console, go to Security > API.
  2. On the Authorization Servers tab, either modify the default authorization server or click Add Authorization Server to add a new one.
    Connect Resco Cloud with Okta: Configuration: Okta add auth server
    • As Name, enter a name for authorization server, for example "resco cloud auth server".
    • As Audience, enter https://resco.net/rescocloud.
  3. Go to the Claims tab and click Add Claim:
    • As Name, enter upn.
    • As Include in token type, select "ID Token" and "Always".
    • As Value type, select "Expression".
    • As Value, enter user.email.
    • Click Create.
  4. Add another claim:
    • As Name, enter uid.
    • As Include in token type, select "ID Token" and "Always".
    • As Value type, select "Expression".
    • As Value, enter user.id.
    • Click Create.
Connect Resco Cloud with Okta: Configuration: Okta adding claims

Connect Resco Cloud to Okta

  1. Sign in to the Resco Cloud management console using a System Administrator user account.
  2. Start the Resco Cloud Admin Console.
  3. Select Settings > Organization from the menu to edit the properties of your organization.
  4. In the Identity provider line, click Connect...
  5. Select OKTA.
  6. As Metadata URL, enter the URL of your Okta authorization server (e.g., https://{your domain}/oauth2/default).
  7. The read-only Redirect URI is provided for your reference (you need it for Okta configuration).
  8. Enter the Client ID and Client Secret from Okta web app configuration.
  9. Enter the Native Client ID from Okta native apps configuration.
  10. Click Connect Now.
  11. You are redirected to the Okta login page. Sign in and you return to the Admin Console with the Okta state set to Connected.

Assign Okta users

You have to assign Okta users to new or existing users of Resco Cloud.

  1. In the Admin Console, go to Resources > Users.
  2. Select an existing user or create a new one.
  3. As the Domain Name, select the Okta login name (by default, this is the email address) of the user who you want to associate with the selected Resco Cloud user.
  4. Click Save & Close.

A red text saying Inactive is displayed next to the Domain Name until the user logs in for the first time. At that point, the text changes into a green Active.

Connect Resco mobile app to Resco Cloud that uses Okta

  1. Tap Synchronize.
  2. As User Mode select OAuth.
  3. Enter the URL of your organization, usually https://{organizationname}.rescocrm.com.
  4. Enter a new password that protects your offline data (twice). This password cannot be recovered so remember it well.
  5. Tap Synchronize.
  6. Enter your Okta credentials.