Skip to main content

Okta Integration Setup

This guide walks you through configuring Okta as an identity provider for RAD Security, giving you flexible authentication options. You can authenticate using either:
  • API Service Integration (Recommended) - Simpler setup, suitable for most use cases
  • App Integration - Advanced option for granular permission control

Prerequisites

Before you begin, ensure you have:
  • Admin access to your Okta tenant
  • Access to RAD Security workspace with integration permissions

The API Service Integration provides the quickest setup path with all necessary permissions pre-configured.

Step 1: Add the Synqly Identity Connector

1

Access Okta Admin Portal

Log in to Okta with admin privileges and navigate to the Admin portal.
2

Navigate to API Service Integrations

Go to Applications > API Service Integrations
3

Add the Integration

  1. Click Add Integration
  2. Search for and select Synqly Identity Connector
  3. Click Next
4

Install and Authorize

Click Install and Authorize to complete the setup
5

Save Credentials

Once authorized, note down the following values in a secure location:
  • Client ID
  • Client Secret
  • Okta Domain

Step 2: Configure in RAD Security

Navigate to your RAD Security workspace and enter the following integration parameters:
ParameterDescription
Client IDThe Client ID from Okta
Client SecretThe Client Secret from Okta
Base URLYour Okta Domain (e.g., https://your-domain.okta.com)
Keep your credentials secure. RAD Security encrypts and stores these values safely.

Option 2: App Integration (Advanced)

Use this method if you need fine-grained control over permissions assigned to the RAD Security integration. This is ideal for disabling features you don’t plan to use.
This setup is more complex and intended for advanced users. Use API Service Integration unless you have specific requirements for custom permission scopes.

Step 1: Create Service App Integration

2

Configure Client Credentials

  1. Navigate to your app integration’s main page
  2. Go to the General tab
  3. Note down the Client ID
  4. Edit Client Credentials > Client authentication
  5. Set to Public key / Private key
3

Generate Keys

  1. Click PUBLIC KEYS > Add
  2. In the dialog, click Generate new key
  3. Click the PEM button under Private key
  4. Note down the Private key securely
  5. Click Save
4

Disable DPoP

Uncheck General Settings > Proof of possession > Require Demonstrating Proof of Possession (DPoP) header in token requests

Step 2: Configure API Scopes

Navigate to the Okta API Scopes tab and grant the scopes you need:

Step 3: Assign Admin Roles

1

Navigate to Admin Roles

Go to the Admin roles tab
2

Edit Assignments

Click Admin assignments granted to this app > Edit assignments
3

Assign Roles

Assign the appropriate admin roles based on your needs:
Assign Read-only Admin or another standard role with View System Log (system events) permission.See Okta’s admin role comparison for details.
Custom admin roles cannot be assigned the View System Log permission. See Okta’s support article for more information.
  • List users: Role with User > View users and their details permission
  • Read individual users: Role with Identity and Access Management > View roles, resources, and admin assignments permission (requires custom admin role)
List groups: Role with Group > View groups and their details permission
For custom admin roles, consider creating a resource set for the role assignment.
Click Save Changes when complete.

Step 4: Configure in RAD Security

Enter the following integration parameters in RAD Security:
ParameterDescription
Client IDThe Client ID from Step 1
Client SecretThe Private Key (PEM format) from Step 1
Base URLYour Okta Domain (e.g., https://your-domain.okta.com)

Verify Integration

After completing the setup, verify your integration is working:
  1. Navigate to Integrations in your RAD Security workspace
  2. Locate your Okta integration
  3. Check the connection status shows as Active
  4. Test authentication by signing in with an Okta user
Your Okta integration is now configured! Users can authenticate through Okta, and RAD Security can sync identity data based on your configured permissions.

Troubleshooting

  • Verify your Client ID and Client Secret are correct
  • Ensure the Base URL includes the full domain (e.g., https://your-domain.okta.com)
  • Check that the integration is authorized in Okta
  • Review the API scopes granted in Okta
  • Verify admin roles are properly assigned
  • For App Integrations, ensure DPoP is disabled
  • Confirm you’ve assigned the Read-only Admin role or equivalent
  • Verify the okta.logs.read scope is granted
  • Note that custom admin roles may not support system log access

Next Steps