Use this page to build and configure your OKTA OIDC
On your Okta admin dashboard, go to Applications > Applications.
Select Create App Integration.
In the Sign-in method section, select OIDC - OpenID Connect.
In the Application type section, select Web Application. Click Next.
Enter a name for the application as relevant to your organization. For example, Acme Inc
.
In the Sign-in redirect URIs field, specify https://pbi.parallels.com/rbi/oidc/signin/callback
and https://pbi.parallels.com/owner/test-idp
.
On the General tab, copy the Client ID and Client secret.
Once the above steps are completed, copy the values from OKTA which should mimic the table below, and paste them into the Parallels Browser Isolation IDP configuration section as shown below:
Click Save and proceed with adding users using the Admin Management section that was configured in the OIDC.
Settings | Value | Details |
---|---|---|
Domain
Ex: acme.com or parallels.com or <yourorgdomain>
The domain name should always match the value used in the email or UPN after the "@" symbol. [Ex; login using TestUser@pbi.parallels.com or TestUser@acme.com]
Discovery URL
Copy this value from OKTA's IDP Settings. It should follow the format specified in the Value Column
Client ID
******************
Copy this value from OKTA's IDP Settings
Client Secret
******************
Copy this value from OKTA's IDP Settings
Username Claim Name
For more info visit; https://developer.okta.com/docs/api/openapi/okta-oauth/guides/overview/
Groups Claim Name
For more info visit; https://developer.okta.com/docs/api/openapi/okta-oauth/guides/overview/