Once an Okta organization is linked to a DNSimple account, any member of the Okta organization can request access to the DNSimple account by attempting to log in via Okta using the respective Okta domain.
Once they are granted access, they can log in directly via Okta. If the user logs out of Okta, they will be logged out of DNSimple.
Linking an Okta organization to a DNSimple account
Follow the instructions below to connect DNSimple to your Okta organization.
From the Assignments page, you can give users and groups from your Okta directory permission to sign in to DNSimple via Okta as an identity provider.
Click the Okta API Scopes tab.
Look for the okta.eventHooks.manage and okta.eventHooks.read scopes, and click Grant for each of them.
Verify the okta.eventHooks.manage and okta.eventHooks.read scopes have been granted.
Configuring DNSimple for Okta SSO
At DNSimple, go to the Account page, and click the Single Sign-On tab.
Click Authorize with Okta to authorize the Workspace.
Fill in the Okta domain, client ID, and client secret, then click Link. You’ll need to log in to the Okta Workspace with access to the okta.eventHooks.manage and okta.eventHooks.read scopes. Your Okta user needs to already be assigned to the DNSimple app integration in Okta with an email address that matches your DNSimple user email address.
After logging in via Okta, you will arrive back on the DNSimple Single Sign-On page with Okta SSO enabled for the account.
Repeat the process for each account where you want Okta SSO enabled.
When configuring Okta SSO, DNSimple creates an event hook in the Okta organization to listen and react to membership changes. If multiple configurations are made to the same Okta organization, only a single hook is created.
If the Okta app is no longer linked (e.g. access token is revoked or event hook removed), you can re-link the Okta application using the “Reauthorize with Okta” button.
Assigning People or Groups
To give people access to DNSimple, click “Assignments” under the configured DNSimple app in your Okta dashboard. Click “Assign”, and select the appropriate users.
If an assigned user does not already have a matching DNSimple user with the same email address, a DNSimple user will be provisioned for them, and the DNSimple account admin will receive a notification that they have been added.
If an assigned user already exists, they will need to link their DNSimple user to their Okta identity on the User Settings page within DNSimple before they can log in to DNSimple with their Okta identity.
The team members can now easily log in with their Okta identity. When you delete or suspend a team member from your company’s Okta organization admin, the corresponding member’s DNSimple access will be revoked automatically, reducing the administration requirements for your organization.
Access control
You can set the level of DNSimple access for each member by visiting the Account > Members tab in your DNSimple account. For full details, visit Domain Access Control.
If you experience any issues or have any questions, please reach out at support@dnsimple.com.
Unlinking an Okta organization from a DNSimple account
Go to the Account page, and click the Single Sign-On tab.
Click Revoke next to the SSO Workspace you want to remove.
Linking a DNSimple user to an Okta identity
When a DNSimple user exists in a DNSimple account before SSO is enabled, they will be required to link their Okta identity to verify ownership of both DNSimple and Okta user accounts. To link a DNSimple user to an Okta identity:
Go to the User Settings page.
In the Identities card, click Add next to the Okta identity provider.
Authenticate your Okta account.
You can now log in to DNSimple using the linked Okta identity.
Unlinking a DNSimple user from an Okta identity
Go to the User Settings page.
In the Identities card, click Remove next to the linked identity.