LogoLogo
HOMEBLOG
  • Getting Started
  • Connect to Data
    • Projects
    • Data Connectors
      • Google BigQuery
      • Google Cloud Storage
      • Iceberg
      • Snowflake
      • AWS S3
      • AWS Athena
      • AWS Redshift
      • Databricks Delta
      • Azure Blob
      • Salesforce
      • SAP Hana
      • File Path Options
      • SQL Server
      • Trino
    • Connection Modes
    • Triggering Scans
    • Configuring a Data Source
  • Profiling Data
    • Data Health Metrics
    • Data Health Overview Page
    • Interactive Profiling Tool: Investigator
    • Data Diff
    • Compound Attributes
      • List of Supported Functions
  • Monitoring Data
    • Data Quality Metrics
    • Alert Policies
    • Data Trends and Alerts
    • Metrics Inspector
  • Data Quality Rules
    • Rules Expression Examples
  • PII Data Detection
  • Remediation
    • Data Binning
    • Circuit Breaker
  • Integrations
    • Jira Integration
    • Slack
    • Jobs Status Notification
  • User Management
    • Okta SSO Setup
    • SSO Configuration
  • API Reference
    • Authentication API
    • API Keys
    • Telmai IP List
    • Get Google Service Account API
  • Source APIs
    • Source APIs
  • Upload Data APIs
    • Upload data from Cloud
      • RedShift Request data
      • GCS Request data
      • Azure Request data
      • GBQ Request data
      • Snowflake Request data
      • Amazon S3 Request data
      • Delta Lake Request
      • Trino Request data
    • Track upload job
    • Check for alerts
  • Admin APIs
    • User Management
  • Telmai Releases
    • Release Notes
      • 25.2.0
      • 25.1.3
      • 25.1.2
      • 25.1.0
Powered by GitBook
On this page
  • Create Okta Group
  • Create Okta Application
  • Setup Application
  1. User Management

Okta SSO Setup

There's currently no APIs exposed for enabling SSO. To setup SSO, you will need to do the followinng

Create Okta Group

  1. Navigate to Directory Groups, and click button to Add Group

  2. Specify the group name appropriately. E.g - “Telmai App Users Group”

  3. Assign users who will need access to Telmai to this group

Create Okta Application

  1. Under Okta Applications, Select "Create App Integration"

  2. Select the following options

    • Sign-in Method OIDC: OpenID Connect

    • Application Type: Web Application

  3. Fill in the App Integration Details as follows:

    • Application Name: Name of the Application. E.g Telmai Integration App

    • Sign-in redirect URIs (provided by Telmai): Ex: https://company.okta.com/oauth2/v1/authorize/callback

      • Scenario 1 : If the okta tenant name is dev123456.okta.com, the URL would be https://dev123456.okta.com/oauth2/v1/authorize/callback

      • Scenario 2 : If the okta tenant is mapped to a domain (ex: acmecompany.okta.com), the url would be https://acmecompany.okta.com/oauth2/v1/authorize/callback

    • Assignments: Controlled access "Limit access to selected groups"

      • Select the group created previously

  4. Save application

Setup Application

Setup your Okta application and retrieve the following details

  • Client ID

  • Client Secret

  • Open-Id configuration (https://<okta-tenant-id/domain>/.well-known/openid-configuration)

You will need to share details with Telmai team to retrieve IDP ID.

Telmai team will enable SSO accordingly

PreviousUser ManagementNextSSO Configuration

Last updated 6 months ago