Using Okta as a trusted identity provider
Using Okta as a trusted identity provider
Coveo SharePoint Server sources support SharePoint instances using Okta as a trusted identity provider. When configuring a SharePoint Server source, you can therefore allow Coveo to authenticate users in SharePoint via Okta.
Before you create a SharePoint security provider and source, however, you must retrieve two application parameters from Okta, as these parameters are required in the SharePoint Server source configuration.
-
Log in to your Okta Developer account.
-
Click Admin.
-
Click Applications, and then, in the dropdown menu, select Applications.
-
Click the SharePoint (On-Premise) application linked to the SharePoint instance you want to make searchable.
-
Click Sign On.
-
Under Settings > Sign On Methods, click View Setup Instructions.
-
On the new page that appears, under Setup a new authentication provider > Create the Okta Trusted Token issuer using PowerShell Script, take note of the
$realm
and$signInURL
values, which should respectively be formatted as follows:-
urn:okta:sharepoint:myid
-
https://YOURINSTANCE.OKTA_OR_OKTAPREVIEW.com/app/sharepoint_onpremise/sso/wsfed/passive
-
These values are required when creating your SharePoint Server source.