Authored on 3/10/2021
datahub-frontend server can be configured to authenticate users over OpenID Connect (OIDC). As such, it can be configured to
delegate authentication responsibility to identity providers like Okta.
This guide will provide steps for configuring DataHub authentication using Okta.
a. Log in to your Okta admin account & navigate to the developer console
b. Select Applications, then Add Application, the Create New App to create a new app.
Web as the Platform, and
OpenID Connect as the Sign on method
d. Click Create
e. Under 'General Settings', name your application
f. Below, add a Login Redirect URI. This should be formatted as
If you're just testing locally, this can be
f. Click Save
On the subsequent screen, you should see the client credentials. Bookmark the
Client id and
Client secret for the next step.
On the same page, you should see an
Okta Domain. Your OIDC discovery URI will be formatted as follows:
At this point, you should be looking at a screen like the following:
datahub-frontend to enable OIDC authentication#
a. Open the file
b. Add the following configuration values to the file:
Replacing the placeholders above with the client id & client secret received from Google in Step 3f.
datahub-frontend-react docker container#
Now, simply restart the
datahub-frontend-react container to enable the integration.
docker-compose -p datahub -f docker-compose.yml -f docker-compose.override.yml up datahub-frontend-react
Navigate to your DataHub domain to see SSO in action.