Skip to content

Commit

Permalink
Update modules/ROOT/pages/platform/security/single-sign-on.adoc
Browse files Browse the repository at this point in the history
Co-authored-by: Jessica Wright <[email protected]>
  • Loading branch information
fiquick and AlexicaWright authored Dec 17, 2024
1 parent e93ea34 commit b11defb
Showing 1 changed file with 2 additions and 2 deletions.
4 changes: 2 additions & 2 deletions modules/ROOT/pages/platform/security/single-sign-on.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -264,8 +264,8 @@ This enables the management of Instance roles via a Role Mapping that is configu
For more info see the link:https://developer.okta.com/docs/guides/customize-tokens-groups-claim/main/#add-a-groups-claim-for-the-org-authorization-server[Okta documentation]

. In your app details page in Okta, go to the Sign On tab and then edit the OpenID Connect ID Token.
. Choose Filter as the Groups claim type
. Choose Matches regex under the Groups claim filter and use .* as the regex
. Select Filter as the Groups claim type
. Select Matches regex under the Groups claim filter and use .* as the expression.
. Save
. You can now update your SSO config in console to include a role mapping.
For Okta, the role mapping should look something like "Neo4j SSO"=admin; where “Neo4j SSO” is the name of your Okta group.
Expand Down

0 comments on commit b11defb

Please sign in to comment.