LogoLogo
  • Getting Started
    • Welcome to Teleskope.ai
    • Your Journey with Teleskope
  • The Platform
    • Data Catalog
    • Data Subject Rights
      • Integrations
      • Enroll Third Party Integrations
        • Amplitude
        • Google Analytics
        • Salesforce
        • Bazaar Voice
        • Intercom
      • Enroll Structured Databases
      • Deletion Methods
    • Policy Maker
    • Issues
    • API Service
      • Scanning API
        • v1/classify
        • v1/classifyCollection
        • v1/scan
      • Redaction API
        • v1/scrub
      • Data Subject Rights
        • GET v1/dsr/requests
        • POST v1/dsr/requests
      • Metadata
        • v1/aws/rds
        • v1/aws/s3
        • v1/snowflake
        • v1/snowflake/users
        • v1/gcp/bigquery
        • v1/gcp/cloudstorage
        • v1/gcp/cloudsql
  • Setup
    • Deployment
    • Role Based Access Control
    • SSO
      • Okta
      • Microsoft Entra
      • Google Auth
  • Specifications
    • Data Store Coverage
    • Compliance Frameworks
    • Redaction Methodologies
    • Data Elements
  • Connectors
    • AWS
      • Athena
      • RDS
      • DynamoDB
      • Redshift
      • S3
      • SNS
      • SQS
    • GCP
      • Cloud Storage
      • Grant Teleskope Access to BigQuery
      • CloudSQL
      • Grant Teleskope Access to CloudLogging
    • SaaS
      • Github
      • Google Drive
      • Jira
      • Segment
      • Zendesk
      • DropBox
      • Box
      • Bitbucket
      • Slack
      • Sharepoint Online
    • Snowflake
    • Azure
      • Azure SQL
      • Azure Database
      • Blob Storage
      • CosmosDB
      • Synapse
    • Databricks
  • DSR
  • Alerting Integrations
    • Slack
    • Tines
Powered by GitBook
On this page
  • Setup
  • Provisioning

Was this helpful?

  1. Setup
  2. SSO

Okta

Setup

Before you can implement authorization, you need to register the Teleskope application in Okta by creating an app integration from the Admin Console.

  1. Open the Admin Console for your org.

  2. Choose Applications to view the current app integrations.

  3. Click Create App Integration.

  4. Select OIDC - OpenID Connect as the Sign-in method.

  5. Select Web Application as the Application type, then click Next.

  6. Enter Teleskope for the App integration name.

  7. In the Sign-in redirect URIs box, enter the callback location where Okta returns the browser. Example: https://api.mission-control.<DOMAIN>/auth/okta/callback.

    1. Optionally:

      1. Set the Sign-out redirect URIs to your Teleskope Dashboard URI. Example: https://observatory.<DOMAIN>

      2. Change Login initiated by to "Either App or Okta" and check Display application icon to users to populate an Okta tile

  8. Fill in the remaining details for your app integration, then click Save.

  9. From the General tab of your app integration, gather your Client ID and Client secret

  10. Click on your email in the top right of the UI, and copy your Issuer value.

    1. The Issuer is typically CompanyName.okta.com/oauth2

  11. Provide these credentials to your Teleskope Representative

Provisioning

Teleskope supports JIT provisioning by default, so be cognizant of what users and groups are assigned to the Teleskope-Okta App.

PreviousSSONextMicrosoft Entra

Last updated 1 month ago

Was this helpful?