After installing or upgrading to vSphere 8.0 Update 1 or later, you can configure vCenter Server Identity Provider Federation for Okta as an external identity provider.
vCenter Server supports only one configured external identity provider (one source), and the vsphere.local identity source (local source). You cannot use multiple external identity providers. vCenter Server Identity Provider Federation uses OpenID Connect (OIDC) for user login to vCenter Server.
You can configure privileges using Okta groups and users through global or object permissions in vCenter Server. See the vSphere Security documentation for details about adding permissions.
Prerequisites
Okta requirements:
- You are using Okta and have a dedicated domain space, for example, https://your-company.okta.com.
- To perform OIDC logins and manage user and group permissions, you must create the following Okta applications.
- An Okta native application with OpenID Connect as the sign-on method. The native application must include the grant types of authorization code, refresh token, and resource owner password.
- A System for Cross-domain Identity Management (SCIM) 2.0 application with an OAuth 2.0 Bearer Token to perform user and group synchronization between the Okta server and the vCenter Server.
See the VMware knowledge base article at https://kb.vmware.com/s/article/90835.
- You have identified the Okta users and groups that you want to share with vCenter Server. This sharing is a SCIM operation (not an OIDC operation).
Okta connectivity requirements:
- vCenter Server must be able to connect to the Okta discovery endpoint, and the authorization, token, JWKS, and any other endpoints advertised in the discovery endpoint metadata.
- Okta must also be able to connect with vCenter Server to send user and group data for the SCIM provisioning.
vCenter Server requirements:
- vSphere 8.0 Update 1 or later
- On the vCenter Server where you want to create the Okta identity source, verify that the VMware Identity Services are activated.
Note: When you install or upgrade to vSphere 8.0 Update 1 or later, VMware Identity Servers are activated by default. You can use use the vCenter Server Management Interface to confirm the status of the VMware Identity Services. See Stop and Start the VMware Identity Services.
vSphere privileges requirements:
- You must have the vCenter Server Identity Provider that is required for federated authentication. To limit a user to view the Identity Provider configuration information only, assign the privilege. privilege to create, update, or delete a
Enhanced Linked Mode requirements:
- You can configure vCenter Server Identity Provider Federation for Okta in an Enhanced Linked Mode configuration. When you configure Okta in an Enhanced Link Mode configuration, you configure the Okta identity provider to use VMware Identity Services on a single vCenter Server system. For example, if your Enhanced Mode Link configuration consists of two vCenter Server systems, only one vCenter Server and its instance of VMware Identity Services is used to communicate with the Okta server. If this vCenter Server system becomes unavailable, you can configure VMware Identity Services on other vCenter Server in the ELM configuration to interact with your Okta server. For more information, see Activation Process for External Identity Providers in Enhanced Linked Mode Configurations.
- When configuring Okta as an external identity provider, all the vCenter Server systems in an Enhanced Linked Mode configuration must run at least vSphere 8.0 Update 1.
Networking requirements:
- If your network is not publicly available, you must create a network tunnel between your vCenter Server system and your Okta server, then use the appropriate publicly accessible URL as the Base Uri.