Integrate P0 with Okta
This topic describes how to integrate P0 with your Okta instance for effective identity and access management. This integration enables you to:
Manage user access and permissions through your Okta instance
Provision AWS access when users federate via Okta SAML
Maintain an inventory of the user directory for Identity and Access Management (IAM) assessments
This guide contains the following sections:
Prerequisites
Existing P0 account at P0.app
Administrative access to an Okta instance. You must have one of the following roles:
Super Administrator
Application Administrator
Integrate Okta for P0
You can integrate Okta from the P0 app:
From the P0.app site, navigate to Integrations, then click Okta.
From the list of Available components, click Directory listing.
On the Directory listing page, click + Add directory.
Keep the browser tab open for the P0.app Directory listing page. You will return to this page in later steps.
In a new tab, log into the Okta Admin Dashboard.
Keep the browser tab open for the Okta Admin Dashboard page. You will return to this page in later steps.
Copy the directory identifier directly from the URL in the browser's address bar.
Return to the browser tab for the P0.app Directory listing page, enter the directory identifier, which can be either a domain (e.g.
example.com
) or a URL (e.g.,example.com/director
), and click Next.
Replace company.okta.com
with your domain.
Copy the Okta public key generated during the installation. You'll use the copied key to Configure Okta. Search...AINewJ
Do not click Next yet. You must complete the steps in Configure Client Credentials before clicking Next.
Ensure you copy the entire key. The contents of the key cannot be accessed again after you click Next.
Keep the browser tab open for the Directory listing page. You will return to this page in later steps.
Configure Okta
Configure settings in Okta to enable secure identity management for your P0 app. In this setup process you will:
Create an Application Instance
Use the application instance to create a secure identity for P0 within Okta, which enables authentication and access management:
In the Okta browser tab, click Applications from the menu, then click Create App Integration.
Select API Services as the application type, then click Next.
Enter a name for your application (e.g.
P0 Integration App
), then click Save.
Configure Client Credentials
Configure the client credentials to set up the secure authentication keys:
Select Applications in your Okta dashboard, then click the newly created application under the General tab.
In the Client Credentials section, click Edit.
Select Public key / Private key authentication, then click Add key.
Paste the public key you copied from P0 during the public key generation process, then click Done.
Return to the browser tab for the P0.app Directory listing page and click Next.
Assign API Scopes
Assign the API scopes that P0 needs, to manage permissions for users and groups in Okta:
Click the Okta API Scopes tab.
Select each of the following scopes, then click Grant to provide the required permissions:
okta.groups.manage
okta.users.read
(Optional) If Amazon Web Services (AWS) user provisioning is set up using the Okta SAML application, grant these scopes:
Okta.apps.manage
- Allows P0 to configure and manage the Okta SAML application connected to AWS.Okta.schemas.manage
- Allows P0 to manage custom user schemas, ensuring accurate synchronization of user attributes with AWS.
Link Okta and P0
Connect the Okta Client ID with P0 to complete the integration:
Return to the General tab of your Okta application, and copy the Client ID.
Return to the browser tab for the P0.app Directory listing page, and paste the Client ID into the Okta application client ID text field.
Click Finish. Once installation is complete, your Okta directory is displayed on the Directory listing page.
Configure Group Management
Set up and manage user groups in Okta to control access and permissions:
From the p0.app site, navigate to Integrations, then select Okta.
From the list of Available components, click Group assignment.
On the Group assignment page, click + Add directory.
Select the directory identifier from the dropdown and click Next.
Switch back to the Okta browser tab, click the Admin roles tab.
Click Edit assignments.
Select Add assignment.
From the Role dropdown, select Group Administrator and click Save Changes.
Return to the browser tab for the P0.app Group assignment page and click Next.
Click Finish.
Congratulations! Youβve configured different identity groups after setting up Okta authentication for P0.
Last updated