![[Post-Mortem] Deploying Athenz with Okta Sign-In: A Partial Success](/_next/image?url=https%3A%2F%2Fmedia2.dev.to%2Fdynamic%2Fimage%2Fwidth%3D800%252Cheight%3D%252Cfit%3Dscale-down%252Cgravity%3Dauto%252Cformat%3Dauto%2Fhttps%253A%252F%252Fdev-to-uploads.s3.amazonaws.com%252Fuploads%252Farticles%252F0ybuhk1m40e0xmdksd64.png&w=1200&q=75)
[Post-Mortem] Deploying Athenz with Okta Sign-In: A Partial Success
Goal [!TIP] In hurry? Jump directly to Result section to see the outcome of this dive. [!NOTE] Although I am organizing and writing this on 2/21 after my LF AI & Data Japan RUG presentation has successfully concluded, I believe it is crucial to leave a record of failures and roadblocks. Therefore, I am documenting this past dive retrospectively. The goal of this dive is to integrate Okta Sign-In with the Athenz ecosystem, by achieving the following: Login into Athenz UI with Okta SSO Successfully run zms-cli with Okta SSO ToC Goal ToC Result Setup Setup: Sign up Okta Setup: Okta with Work Email Setup: Okta Verify for Mac OS locally Test: Login Okta Setup: Okta App Integration Setup: Okta Authorization Server API Setup: Okta Policy & Rules Test: Token Preview Setup: sub as athenz user service name Test: sub from Token Preview Setup: Access Token Test: Access Token Setup: Adding ZMS properties so that ZMS can trust the okta verify Setup: Make sure to restart the ZMS server to get the cha
Continue reading on Dev.to
Opens in a new tab


