Jonas Schultz, Solutions Engineer @ GlobalDots
14.10.2021
image 2 Min read

If you use Okta without any additional Active or LDAP Directory and want to use the existing user and groups from Okta in Akamai’s EAA, this article becomes handy to you. Especially if you use Okta as an Identity Provider (IDP) for your EAA applications.

Instructions

We have to parts here:

Part One: Okta Configuration

  1. You need admin access inside the Okta portal.
  2. Login and create a new LDAP interface directory on the admin portal. To do that click on the menu ‘Directory’ on ‘Directory Integrations’.
  3. Click on ‘Add Directory’ and choose ‘Add LDAP Interface’. If this option is not available the LDAP interface will exist already.
  4. In result, you will see a settings page with all necessary information to set it up in Akamai EAA. Please see the example below. We are not done yet.
  5. We still have to create a user inside Okta with Admin Read-Only rights which can access the directory from outside and disable the need for MFA for him. The steps to do this are out of scope here.

Part Two: Akamai EAA – Setup LDAP Directory

Prerequisite: A working connector with a public IP who can access the Okta LDAP interface. Please remember Okta is a cloud service.

  1. Login to Akamai and open EAA. From the ‘Identity’ menu choose ‘Directories’.
  2. Click on ‘Add Directory’ button on the top right.
  3. Name your new directory and choose ‘LDAP’ as type. 
  4. On the next page start to fill in your credentials and server information from the Okta settings. Please use your own uid and dc attribute here.
  5. Associate the correct connector to the setup.
  6. Fill in the ‘Attribute mapping’ and additional attributes exactly as stated in the attached PDF document. Please also pay attention to upper and lower case letters! This is truly important as it won’t work else! Remember to use your own uid and dc attributes.
  7. Save and close the directory integration.
  8. Check if the directory is up. If not open the directory diagnostics and test the connectivity and search for users and groups.
  9. If everything works here you can start and add some groups from your Okta directory. Unfortunately, you have to add them manually one by one or using wildcards if possible. According to Akamai this is a feature, not a bug :wink:. Once a group has added the users inside this group were synced automatically afterward. At least one group from Okta is always there – ‘Everyone’.
Only groups that were added manually in EAA are synced with all the users inside. Please remember Okta’s LDAP interface is read-only!

That’s it. Next step is, if not already done:

Add Okta as your identity provider (IDP).

This step is documented on Akamai and a template for Okta will exist.

Good luck!

Learn More

Long-Term LastPass Breach Sounds Alarm For Static Credentials
Identity & Access Management (IAM)
Jonas Schultz, Solutions Engineer @ GlobalDots 02.03.23

LastPass’ password management service has introduced millions of users to the convenience and security of unique passwords. Across mobile and browser, LastPass promises a near-passwordless experience for millions of individuals and over 100,000 businesses. However, recent news threatens to drop a bombshell on credential-based security.  The Year-Long LastPass Dual Breach  In August 2022, LastPass released […]

Read more
How To Implement Passwordless Authentication: A Step by Step Guide
Customer Identity & Access Management (CIAM) Identity & Access Management (IAM) Passwordless Authentication
Jonas Schultz, Solutions Engineer @ GlobalDots 27.07.22

Login details are criminals’ favorite type of data, as they allow complete impersonation of a legitimate user on your system. By successfully compromising an account, an attacker becomes a wolf in sheep’s clothing, appearing completely innocuous until they launch their attack.  One of the most common consequences of cracked credentials is a data breach, the […]

Read more
2022: The Year End-User Accounts Go Passwordless
Identity & Access Management (IAM) Passwordless Authentication
Jonas Schultz, Solutions Engineer @ GlobalDots 23.02.22

Why Passwordless, Why Now? Advances in technologies pose new dangers online as more people use devices to do their shopping and finances. The remote work era pedaled, further extending technology adoption, so growing concerns regarding security and new methods are more valid than ever. Progress comes with leaving behind obsolete methods to improve efficiency and […]

Read more
Unlock Your Cloud Potential
Schedule a call with our experts. Discover new technology and get recommendations to improve your performance.
Book a Demo