Skip to main content

Configuring Okta Authentication for React App (OIDC)

Authored on 3/10/2021

datahub-frontend server can be configured to authenticate users over OpenID Connect (OIDC). As such, it can be configured to delegate authentication responsibility to identity providers like Okta.

This guide will provide steps for configuring DataHub authentication using Okta.


1. Create an application in Okta Developer Console#

a. Log in to your Okta admin account & navigate to the developer console

b. Select Applications, then Add Application, the Create New App to create a new app.

c. Select Web as the Platform, and OpenID Connect as the Sign on method

d. Click Create

e. Under 'General Settings', name your application

f. Below, add a Login Redirect URI. This should be formatted as

If you're just testing locally, this can be http://localhost:9002/callback/oidc.

f. Click Save

2. Obtain Client Credentials#

On the subsequent screen, you should see the client credentials. Bookmark the Client id and Client secret for the next step.

3. Obtain Discovery URI#

On the same page, you should see an Okta Domain. Your OIDC discovery URI will be formatted as follows:

for example,

At this point, you should be looking at a screen like the following:

okta-setup-1 okta-setup-2


4. Configure datahub-frontend to enable OIDC authentication#

a. Open the file docker/datahub-frontend/env/docker.env

b. Add the following configuration values to the file:


Replacing the placeholders above with the client id & client secret received from Google in Step 3f.

5. Restart datahub-frontend-react docker container#

Now, simply restart the datahub-frontend-react container to enable the integration.

docker-compose -p datahub -f docker-compose.yml -f docker-compose.override.yml  up datahub-frontend-react

Navigate to your DataHub domain to see SSO in action.