DigiCert ONE Login - Supplying claims using Okta
You can configure Okta to add claims to OIDC ID token. This is required for DigiCert ONE login through DigiCert® Trust Assistant using OIDC. For generic information about the configuration, such as configuring single sign-on, creating user, editing user information, and creating and adding a user to groups, refer to official Okta documentation.
Add group in Okta
In Okta, go to Directory > Groups, and select Add group.
In the Name field, enter the name for the group and select Save.
To specify the group to a user, select the created group under the Group name column.
Select Assign people.
Click the + sign next to the name to assign people to the group.
Add or edit custom user attributes
Go to Directory > Profile Editor and select User (default).
Select Add Attribute.
In the Add Attribute page, enter the required information in the fields and select Save.
To edit user attributes, go to Directory > People and select the target user.
Select the Profile tab and select Edit.
Edit the attribute and select Save.
Supply attribute in claim
In Okta, go to Security > API and under the Authorization Servers tab, select the API used for DigiCert One login.
In the Claims tab, select Add Claim.
In the Add Claim window, add first name to the claim with the following information, and select Create:
Name: first_name
Include in token type: ID Token, Always
Value type: Expression
Value: user.firstName
Add one more claim, last name:
Name: last_name
Include in token type: ID Token, Always
Value type: Expression
Value: user.lastName
(Optional) To add additional user information to the certificate issued by the user, you must add those attributes to the ID Token. Add the claims in the same manner as above.
Supply group in claim
In Okta, go to Security > API and under the Authorization Servers tab, select the API used for DigiCert One Login.
In the Claims tab, select Add Claim.
In the Add Claim window, enter or select the following information, and select Create:
Name: groups
Include in token type: ID Token, Always
Value type: Groups
Filter: Matches regex, .*
Check ID token
You can preview the ID Token in the Token Preview tab. Ensure that you select:
Grant type: Authorization Code
Scopes: openid
Additional references
The following are links to official guides on Okta with more details about the process explained above.
참고
DigiCert provides these third-party URLs for your convenience. While we aim to link to reputable sources, we are not responsible for the content or availability of these external sites.