T15-2026 - How to integrate OKTA with Discoverant 2026 SP1
This document outlines the configuration steps required to integrate Okta with Discoverant applications.
Program
BIOVIA Discoverant
Operating System
All supported operating systems
Description
This document outlines the configuration steps required to integrate Okta with Discoverant applications. To support this integration, two application types must be configured:
- Web Application (for Discoverant Web Applications)
- Native Application (for Discoverant Rich Client)
IMPORTANT! You must have Okta Administrator access to complete these configurations.
OKTA Configuration Guide
Web Application Configuration
- Sign in to your Okta account as an administrator.
- In the Okta Admin Console, navigate to Applications > Applications.
- Click Create App Integration.
- In the Create a new app integration dialog box,
- Select OIDC – OpenID Connect as the sign-in method.
- Select Web Application as the application type.
Click Next.
The New Web App Integration screen appears.
- Configure the General Settings:
In the App Integration name field, enter a recognizable name.
For example: My Web App
- Under Grant type, select Authorization Code.
- Configure Sign-in Redirect URIs:
In the Sign-in redirect URIs field, add each of the following URIs.
https://[HOST_NAME]:[PORT_NUMBER]/discoverant-admin/oktaCallback
https://[HOST_NAME]:[PORT_NUMBER]/discoverant-hvu/oktaCallback
https://[HOST_NAME]:[PORT_NUMBER]/discoverant-kn/oktaCallback
https://[HOST_NAME]:[PORT_NUMBER]/discoverant-primr/oktaCallback
https://[HOST_NAME]:[PORT_NUMBER]/discoverant-quickassist/json/okta_callback
https://[HOST_NAME]:[PORT_NUMBER]/discoverant-ws/oktaCallback
https://[HOST_NAME]:[PORT_NUMBER]/discoverant-hdml-api/oktaCallback
Notes:
- The hostname in all redirect URIs must be lowercase. Using uppercase may cause authentication failure.
- If you use multiple hostnames, add each hostname individually or enable wildcard support (if allowed), For example: https://*.dsone.3ds.com:18443/discoverant-admin/oktaCallback
- Configure Sign-out Redirect URIs:
In the Sign-out redirect URIs field, add the following URI to enable PRIMR double signature:
https://[HOST_NAME]:[PORT_NUMBER]/discoverant-primr/oktaLogout
Note: The hostname in all redirect URIs must be lowercase. Using uppercase may cause authentication failure.
- Click Save to complete the Web Application configuration.
Retrieve Client ID and Client Secret to use in Discoverant
After creating the application, retrieve the credentials required for the Discoverant configuration.
- In the Okta Admin Console, navigate to Applications > Applications.
- Select your application, and then open the General tab.
- Under Client Credentials, ensure Client Authentication is set to Client Secret.
- Copy the Client ID.
- Under Client Secrets, click Generate new secret, and then copy the Client Secret.
Native Application Configuration
- Sign in to your Okta account as an administrator.
- In the Okta Admin Console, navigate to Applications > Applications.
- Click Create App Integration.
- In the Create a new app integration dialog box,
- select OIDC – OpenID Connect as the Sign-in method.
- Select Native Application as the Application type.
click Next.
A New Native App Integration screen appears.
- Configure General Settings:
In the App Integration name field, enter a recognizable name.
For example: My Native App
- Under Grant type, select Authorization Code.
- Configure Sign-in Redirect URIs,
In the Sign-in redirect URIs field, add the following URIs.
https://[HOST_NAME]:[PORT_NUMBER]/discoverant-web-util/okta-Callback
Note: The hostname in all redirect URIs must be lowercase. Using uppercase may cause authentication failure.
- Click Save to complete the Native Application configuration.
Retrieve Client ID to use in Discoverant
After creating the application, retrieve the credentials required for the Discoverant configuration.
- In the Okta Admin Console, navigate to Applications > Applications.
- Select your application, and then open the General tab.
- Under Client Credentials, ensure Client Authentication is set to None and PKCE (Proof Key for Code Exchange) is enabled. This is required for secure authorization in native applications.
- Copy the Client ID.
Users and Group Assignment
After configuring each application, you must assign users or groups who are permitted to use it. Repeat this step for both the Web Application and Native Application.
- In the Okta Admin Console, navigate to Applications > Applications.
- Select your application, and then open the Assignments tab.
- Click Assign, then choose either of the following:
- Assign to People - Add individual users
- Assign to Groups - Add groups
- Click Done.
Additional Configuration for Org Authorization Server
You can choose to use either the Okta Org Authorization Server (default, non-customized) or a customized authorization server. If you are using the Okta Org Authorization Server (default, non-customized), enable the following settings to ensure compatibility with Discoverant authentication.
- In your application, go to the General tab, and locate the General Settings section.
- Click Edit, then navigate to Advanced Settings for Grant type and expand it.
- Enable the following options:
- Implicit (Hybrid)
- Allow ID Token with implicit grant type
- Click Save.
Group Claims Configuration
To ensure that user group information is included in the ID token for Discoverant authorization, configure group claims as follows:
- In the Okta Admin Console, navigate to Applications > Applications.
- Select your application, and then open the Sign On tab.
- Expand Show legacy configuration under Token claims.
- Click Edit.
- Configure the Group Claims settings:
a. In the Group claim type field, select Filter.
b. In the Group claim filter section, choose one of the following options based on your requirement:
- Matches regex - to include groups using a regular expression pattern.
- Starts with - to include groups based on a naming prefix.
c. To include all groups, select Matches regex and enter: .*
- Click Save to apply the configuration.
Configuration for Custom Authorization Server (Optional)
If you use a custom Authorization Server, additional configuration is required to include group claims.
Access Authorization Server
- In the Okta Admin Console, navigate to Security > API > Authorization Servers.
- Perform one of the following actions:
- Select an existing Authorization Server, or
- Click Add Authorization Server to create a new one.
Claims Configuration
- Open the selected Authorization Server.
- Navigate to the Claims tab.
- Click Add Claim, and configure the following:
- Name: groups (must be exactly "groups")
- Include in token type: ID Token (Always)
- Value type: Groups
- Under Filter, configure one of the following:
- Use an appropriate filter based on your group structure, or
- To include all groups, select Matches regex and enter: .*
- Under Include in, select Any scope.
- Click Create to save the claim.
Access Policy Configuration
- Navigate to the Access Policies tab for the selected Authorization Server.
- Create a policy if one does not already exist.
- Under the policy, click Add rule.
- Configure the rule with the following settings:
- Authorization Code should be selected for Grant type.
- Client Credentials and Device Authorization grant types should be unselected.
- Configure additional settings (such as user conditions, scopes, and token lifetime) based on your organizational requirements.
- Click Create rule to save the configuration.
Additional Notes
- Any settings not explicitly mentioned in this document may be left as default or configured as needed.
- Ensure consistency between configured values and your Discoverant environment.
How to contact BIOVIA Support
If you have any questions, please contact BIOVIA Support.
Need Assistance?
Our support team is here to help you make the most of our software. Whether you have a question, encounter an issue, or need guidance, we've got your back.