Setting Up OpenID Connect (OIDC) in Okta

Knowledge Drop

Last tested: Jul 21, 2020
 

  1. Once logged into Okta, navigate to 'applications' tab
  2. Click 'Add Application' option

one.png

  1. Click the 'Create New App'

two.png

  1. Ensure your new application has the 'OpenID Connect' option selected
  2. Click 'create'

three.png

  1. Name your application, and enter your Looker URI with /openidconnect added to the end of it (as described in our OIDC docs). Make sure you are NOT using the admin version of the URL!
  2. Click 'Save'

four.png

  1. Ensure you are in the 'General' tab of the new application

five.png

  1. Scroll down to the bottom of the 'general' page and get your Client ID (which maps to the 'Identifier' field in Looker's Admin/OIDC page) and Client Secret (which maps to the 'Secret' field in Looker's Admin/OIDC page)

six.png

  1. Fill out all the necessary fields in the Looker UI as per our OIDC documentation. Take special note of which 'scopes' are required ("The OpenID Connect requires the openid scope, but your OP will likely include other scopes, such as email, profile, and groups.) As shown in our docs, the information for Authorization URL, Token URL, and User Info URL would follow the following format, though you'd replace the last path specified with the respective information name ( /token for token and /userinfo for user info):
 

https://${yourOktaDomain}/oauth2/v1/authorize

Plain Text

Screen Shot 2019-09-18 at 12.51.20 PM.png

  1. Claim scopes as listed here: https://openid.net/specs/openid-connect-core-1_0.html#ScopeClaims
  2. Please test your OIDC settings!

This content is subject to limited support.                

Version history
Last update:
‎04-30-2021 11:14 AM
Updated by: