OKTA OIDC Configuration

Use this page to build and configure your OKTA OIDC

  1. On your Okta admin dashboard, go to Applications > Applications.

  2. Select Create App Integration.

  3. In the Sign-in method section, select OIDC - OpenID Connect.

  1. In the Application type section, select Web Application. Click Next.

  2. Enter a name for the application as relevant to your organization. For example, Acme Inc.

  3. In the Sign-in redirect URIs field specify https://pbi.parallels.com/rbi/oidc/signin/callback.

  4. On the General tab, copy the Client ID and Client secret.

  1. Once the above steps are completed, copy the values from OKTA which should mimic the table below, and paste them into the Parallels Browser Isolation IDP configuration section as shown below:

SettingsValueDetails

Domain

Ex: acme.com or parallels.com or <yourorgdomain>

The domain name should always match the value used in the email or UPN after the "@" symbol. [Ex; login using TestUser@pbi.parallels.com or TestUser@acme.com]

Discovery URL

Copy this value from OKTA's IDP Settings. It should follow the format specified in the Value Column

Client ID

******************

Copy this value from OKTA's IDP Settings

Client Secret

******************

Copy this value from OKTA's IDP Settings

Username Claim Name

Groups Claim Name

  1. Click Save and proceed with adding users using the Admin Management section that was configured in the OIDC.

Last updated

Other Resources

Feedback

© 2024 Parallels International GmbH. All rights reserved.