Okta SSO
Configure Okta single sign-on for Cased CD Enterprise
This guide walks through setting up Okta as your identity provider for Cased CD Enterprise.
Prerequisites
Section titled “Prerequisites”- Okta account with admin access
- Cased CD Enterprise deployed
- ArgoCD 2.0+
-
Create an Okta Application
In your Okta Admin Console:
- Navigate to Applications → Applications
- Click Create App Integration
- Select OIDC - OpenID Connect
- Select Single-Page Application
- Click Next
-
Configure the application
- App integration name:
Cased CD - Grant type: Authorization Code
- Sign-in redirect URIs:
https://cased-cd.example.com/auth/callback - Sign-out redirect URIs:
https://cased-cd.example.com/login - Controlled access: Select your assignment policy
For local development, also add
http://localhost:5173/auth/callbackto redirect URIs. - App integration name:
-
Note your credentials
After creating the app, note:
- Client ID (from the application’s General tab)
- Okta domain (e.g.,
dev-123456.okta.com)
-
Configure ArgoCD
Terminal window kubectl patch configmap argocd-cm -n argocd --type merge -p 'data:url: "https://cased-cd.example.com"oidc.config: |name: Oktaissuer: https://dev-123456.okta.comclientID: YOUR_CLIENT_IDrequestedScopes: ["openid", "profile", "email", "groups"]' -
Restart ArgoCD
Terminal window kubectl rollout restart deployment argocd-server -n argocd
Test the login
Section titled “Test the login”- Navigate to your Cased CD login page
- Click “Sign in with Okta”
- Log in with your Okta credentials
- You’ll be redirected back and logged in
Configure groups
Section titled “Configure groups”Create groups in Okta
Section titled “Create groups in Okta”- In Okta Admin Console, go to Directory → Groups
- Create groups like
cased-cd-admins,cased-cd-developers - Assign users to groups
Add groups claim to the application
Section titled “Add groups claim to the application”- Go to Applications → Cased CD → Sign On
- Click Edit in the OpenID Connect ID Token section
- Add a groups claim:
- Name:
groups - Include in token type: ID Token, Always
- Value type: Filter
- Filter: Matches regex
.*(or filter to specific groups)
- Name:
Configure ArgoCD RBAC
Section titled “Configure ArgoCD RBAC”kubectl patch configmap argocd-rbac-cm -n argocd --type merge -p 'data: policy.csv: | p, role:developer, applications, get, */*, allow p, role:developer, applications, sync, */*, allow p, role:admin, applications, *, */*, allow g, cased-cd-developers, role:developer g, cased-cd-admins, role:admin'Troubleshooting
Section titled “Troubleshooting””Invalid redirect_uri” error
Section titled “”Invalid redirect_uri” error”Verify that:
- The redirect URI in Okta matches your Cased CD URL exactly
- Include the
/auth/callbackpath - Protocol (http vs https) matches
Groups not appearing
Section titled “Groups not appearing”- Verify the groups claim is configured in the Okta application
- Check that users are assigned to groups in Okta
- Ensure
groupsis in therequestedScopesin ArgoCD config
”unauthorized_client” error
Section titled “”unauthorized_client” error”- Verify the Client ID is correct in ArgoCD config
- Check that the application type is “Single-Page Application”
- Ensure “Authorization Code” grant type is enabled