Versions Compared
Key
- This line was added.
- This line was removed.
- Formatting was changed.
Getting started
.API Authentication Setup
To start, you will need Okta API credentials from your Organization Okta Account. You will need
User Token
URL to your okta instance.
Both pieces of information can be found in Okta admin. Navigate to Security > API.
Copy the Issuer URI.
Navigate to the token tab and generate a new token. Copy the new token.
Both pieces of information will be needed in the next step.
Next enter the information in Okta API Credentials area of Okta Profiles and validate the information.
Image RemovedImage Removed.
Image AddedOAuth2 Authentication
Step 1: General Settings
Navigate to your Okta Dashboard.
Go to Applications and select the application you wish to configure.
Under the General Settings, configure the Application section as follows:
Application type: Web
Grant type: Make sure to enable both Authorization Code and Refresh Token.
Step 2: Refresh Token
Within the same General Settings:
Scroll to the Refresh Token section.
Select Use persistent token to ensure that the refresh tokens are long-lived.
Step 3: Login Redirection
Under the Login section, locate the Sign-in redirect URIs.
Add your specific redirect URI. For JIRA integrations, it typically looks like this:
Code Block language none <JIRA_URL>/plugins/servlet/ac/com.mumosystems.okta-profiles/connection-page
Ensure that you replace
<JIRA_URL>
with your actual JIRA instance URL.If your application setup requires, enable the option to Allow wildcard * in login URI redirect.
Step 4: Okta API Scopes
Scroll to the Okta API Scopes section.
Grant the following scopes by ensuring they are set to Granted:
okta.users.read
okta.users.manage
okta.eventHooks.read
okta.eventHooks.manage
okta.groups.read
okta.groups.manage
okta.schemas.read
These scopes control which API endpoints the application can access and what operations it can perform.
Step 5: User Consent
In the User Consent section, select Require consent.
Provide the Terms of Service URI, Policy URI, and Logo URI if necessary.
Step 6: Finalizing Setup
After completing the configuration:
Review all settings to ensure they are correct.
Click Save to apply the changes.
Step 7: Reviewing Granted Scopes
In the Okta API Scopes tab, verify that all required scopes have been granted.
If any scopes are missing, grant them accordingly.
Step 8: Activation and Testing
Ensure that the application status is set to Active.
Test the integration to confirm that the OAuth flow is functioning as expected. This can be done by attempting to sign in through the integration and checking for successful redirection and authentication.
Back in Jira, enter same api URL from Okta above. Then paste the client ID and Client secret. Make sure to validate then sync the data.
Image AddedSynchronize Data
Synchronize the users. This might take a while depending on the amount of users you are synchronizing. Once this is done, you will have a user directory of all Okta users that match users in Jira.
Table of Contents | ||||
---|---|---|---|---|
|