OKTA OIDC Configuration

Use this page to build and configure your OKTA OIDC

  1. On your Okta admin dashboard, go to Applications > Applications.

  2. Select Create App Integration.

  3. In the Sign-in method section, select OIDC - OpenID Connect.

  1. In the Application type section, select Web Application. Click Next.

  2. Enter a name for the application as relevant to your organization. For example, Acme Inc.

  3. In the Sign-in redirect URIs field, specify https://pbi.parallels.com/rbi/oidc/signin/callback and https://pbi.parallels.com/owner/test-idp.

  4. On the General tab, copy the Client ID and Client secret.

  1. Once the above steps are completed, copy the values from OKTA which should mimic the table below, and paste them into the Parallels Browser Isolation IDP configuration section as shown below:

Settings
Value
Details

Domain

Ex: acme.com or parallels.com or <yourorgdomain>

The domain name should always match the value used in the email or UPN after the "@" symbol. [Ex; login using [email protected] or [email protected]]

Discovery URL

Copy this value from OKTA's IDP Settings. It should follow the format specified in the Value Column

Client ID

******************

Copy this value from OKTA's IDP Settings

Client Secret

******************

Copy this value from OKTA's IDP Settings

  1. Click Save and proceed with adding users using the Admin Management section that was configured in the OIDC.

Last updated

Was this helpful?