Setting up SSO authentication for Cloudera Octopai Data Lineage using Azure Active Directory (Azure AD) or Microsoft Entra ID

Learn about setting up SSO authentication for Cloudera Octopai Data Lineage using OKTA.

  1. Login to OKTA and access Applications
    • Login to OKTA with the Admin User of your OKTA instance.
    • Go to the Applications tab in the top menu.
    • Click Create New App.
  2. Configure the Application Integration.
    1. The Create New Application Integration window opens up.
    2. Select the OpenID Connect sign-on method.
  3. Fill in the Application parameters.
    1. Fill all fields in the Create OpenID Connect Integration window.
    2. Click Save to complete the creation of the new application connection.
  4. Click Edit in the General Settings to edit the application settings.
  5. Configure the Grant Type.
    1. Select the Implicit (Hybrid) checkbox for the Allowed grant type.
    2. Select the Allow ID Token with implicit grant type checkbox.
    3. Click Save.
  6. Click ← Back to Applications to return to the Applications.

As a final step, send your Cloudera Octopai representative the following details to add OKTA SSO to your Cloudera Octopai application authentication:

  • Client ID. For more information, see Authorization | Okta
  • OKTA Redirect URI. For more information, see Authorization | Okta
  • OKTA Issuer. For more information, see Issuer
  • SSO well-known (Metadata URI). This can be found in Security > API > Authorization server > Edit > Settings > Metadata URI.