Configure the Identity Provider (IdP): Okta
OnSite Deployment
This is an outline of the key steps and requirements for registering the OnSite app with Okta. We recommend you consult with your IT department for steps specific to your organization.
Step 1. Register the new Otka app integration
- Sign in to Okta Workforce Identity Cloud.
- Go to Applications.
- Click Create App Integration.
- Select the OIDC - OpenID Connect, then Native Application.

- Click the Next button.

- Fill in a App integration name for your application.
- Select Allow everyone in your organization to access option.
- Click the Save button.
Step 2. Complete the General settings

- Under the General Settings, click the Edit button.

- Under the Grant type, select the Refresh Token.
- Under the Refresh Token, use the persistent token.
If this option is not selected, the user will be prompted to login again when the token expires.
Step 3. Set up the Redirect/Callback URIs
- Under Sign-in redirect URIs, click the Add URI button.
- Fill in the value: com.archibus.onsite.auth:/callback
Make sure that the callback redirect URI is filled in as indicated.
If you are using the Web version of Postman, also add: https://oauth.pstmn.io/v1/browser-callback

- Under the Sign-out redirect URIs, click the Add URI.
- Fill in the value: com.archibus.onsite.auth:/logout

- Click the Save button to complete the configuration.
The default well-known configuration endpoint for Okta is:
https://{yourOktaDomain}/.well-known/openid-configuration
Step 4. Validate the application using Postman
- Open a browser and navigate to https://web.postman.co
- Go to Workspaces and select My Workspace.
- Create a new (blank) collection and name it appropriately.
- Select Authorization tab.
- Complete the following:
- Auth Type: change to Oauth 2.0
- Grant type: change to Authorization Code (With PKCE)
- Callback URL: any of the Redirect URIs, Okta app registration step8/9
- Auth URL: https://{yourOktaDomain}/oauth2/v1/authorize
- Access Token URL: https://{yourOktaDomain}/oauth2/v1/token
- Client ID: Client ID, Okta app registration step 5
- Scope: openid
- State: 1
- Client Authentication: change Send as Basic Auth Header to Send client credentials in body.
- Click Get New Access Token button.

Step 5. Set up Archibus Web Central to use the Okta app
Configure the following Archibus Web Central properties files to reflect the Okta identity provider (IdP) and the Apollo GraphQL server.
- \archibus\WEB-INF\config\oidc.properties
- \archibus\WEB-INF\config\context\applications\configservice.properties
Learn what to change, in Configure Web Central to Use the Okta Identity Provider.
