Configure an Okta app integration

Before setting up your Okta backup, you must first create an app integration and assign the necessary permissions to allow data access for backup and restore. Additionally, you'll need to prepare a user with the Super Administrator role to create and authenticate the connector.

I. Assign admin role to user

Before adding a new app integration, ensure that the user you’ll use to authenticate the connector has the appropriate role assigned. This role grants the necessary permissions for the connector to function correctly.

1. In the left-hand navigation menu, open Security > Administrators.

2. Go to Admins.

3. Click Add Administrator.

4. Select the user whose account will be used to authenticate the connector.

5. Assign the Super Administrator role.

6. Click Save Changes.

II. Create a new app integration

1. In the left-hand navigation menu, open Applications Applications.

2. Click Create App Integration.

3. Select OIDC - OpenID Connect from the available sign-in methods, then choose Web Application from the available application types.

4. Click Next.

5. Provide a meaningful name for your app integration, for example: "Keepit Beta Test Integration Application."

6. Enable the Refresh Token grant type option.

7. Enter the redirect URI that corresponds to your data center:

Australia AU-SY: https://au-sy.keepit.com/desktop/oauth
Canada CA-TR: https://ca-tr.keepit.com/desktop/oauth
Germany DE-FR: https://de-fr.keepit.com/desktop/oauth
Denmark DK-CO: https://dk-co.keepit.com/desktop/oauth
United Kingdom UK-LD: https://uk-ld.keepit.com/desktop/oauth
United States US-DC: https://us-dc.keepit.com/desktop/oauth
Switzerland CH-ZH: https://ch-zh.keepit.com/desktop/oauth

8. At the bottom of the page, in section Assignments, select Skip group assignment for now.

9. Click Save.

III. Grant scopes

1. In your newly created application, go to the Okta API Scopes tab.

Note: If the list of scopes doesn't appear on this page, please wait a minute or two, then refresh the page and try again.

2. Grant these scopes: 

  • okta.clients.readokta.apiTokens.readokta.appGrants.readokta.apps.read
  • okta.apps.manage
  • okta.authenticators.readokta.captchas.readokta.groups.read
  • okta.groups.manage
  • okta.idps.readokta.linkedObjects.read
  • okta.linkedObjects.manage
  • okta.networkZones.readokta.oauthIntegrations.readokta.orgs.read
  • okta.orgs.manage
  • okta.policies.read
  • okta.profileMappings.read
  • okta.rateLimits.read
  • okta.rateLimits.manage
  • okta.roles.readokta.schemas.read
  • okta.schemas.manage
  • okta.templates.readokta.threatInsights.readokta.trustedOrigins.readokta.users.read
  • okta.users.manage
  • okta.userTypes.read
  • okta.userTypes.manage

IV. Assign user to app integration

1. In the left-hand navigation menu, open Directory People.

2. Open the user who has been assigned the Super Administrator role. 

3. In Applications, click Assign Applications.

4. Find your integration app and click Assign.

Your Okta integration application is now ready and you can proceed to add an Okta connector in Keepit.