Using Okta as a trusted identity provider

In this article

Coveo SharePoint Server sources support SharePoint instances using Okta as a trusted identity provider. When configuring a SharePoint Server source, you can therefore allow Coveo to authenticate users in SharePoint via Okta.

Before you create a SharePoint security provider and source, however, you must retrieve two application parameters from Okta, as these parameters are required in the SharePoint Server source configuration.

  1. Log in to your Okta Developer account.

  2. Click Admin.

  3. Click Applications, and then, in the dropdown menu, select Applications.

  4. Click the SharePoint (On-Premise) application linked to the SharePoint instance you want to make searchable.

  5. Click Sign On.

  6. Under Settings > Sign On Methods, click View Setup Instructions.

  7. On the new page that appears, under Setup a new authentication provider > Create the Okta Trusted Token issuer using PowerShell Script, take note of the $realm and $signInURL values, which should respectively be formatted as follows:

    • urn:okta:sharepoint:myid

    • https://YOURINSTANCE.OKTA_OR_OKTAPREVIEW.com/app/sharepoint_onpremise/sso/wsfed/passive

These values are required when creating your SharePoint Server source.