Passport Configuration with Okta

By Corey Willis

Create an OpenID Connect (OIDC) application in Okta for use in configuring Kandji Passport.

When configuring the Passport library item, you need the Client ID (Application ID) and Identity provider URL. Use these steps to configure the OIDC app and collect the required information.

  1. In your Okta Administrator Console, in the left menu pane, expand the Applications section and select Applications.
  2. Click Create App Integration.

  3. For Sign-in Method, select OIDC - OpenID Connect.
  4. For Application Type, select Native Application.
  5. Click Next.


  6. In the App integration name field, enter a name such as Kandji Passport.
  7. In the Grant type section, confirm that the checkbox for Refresh Token is deselected. This option must be turned off to ensure that Passport prompts users to update their Mac password while logged in if their Okta password changes.
  8. In the Grant type section, select the checkbox for Resource Owner Password.

    Note: If your Okta instance hasn’t yet been updated from Classic to Okta Identity Engine (OIE), the Interaction Code grant type (as displayed in the following figure) will not be displayed.

  9. In the Sign-in redirect URIs section, click Add URI.
  10. In the new field that appears, enter the following:
    https://localhost.redirect

  11. In the Assignments section, select whether to assign the app integration to everyone in your org, only selected group(s), or skip assignment until after app creation. In the General tab of the Application you just created, note the Client ID.

  12. Click Save.
  13. Open a secure text document that you can use to store values for this OIDC app. You will need these details when you configure the Passport Library Item.
  14. In the General tab of the OIDC application you just created, on the right side of the Client ID field, click the copy icon (looks like a clipboard).

  15. Paste the value into your secure text document.
  16. Copy the formula for your Identity provider URL from the following text: https://yourOktaDomain/.well-known/openid-configuration
  17. Paste the text into your secure text document.
  18. In your secure text document, replace yourOktaDomain with your Okta domain.



You do not need a custom Sign-On Policy Rule, but if you add one, ensure MFA is disabled.
With the Okta configuration complete, assign the app to the users using Passport to sign in to their Mac systems, and go to the Kandji web app to configure the Passport library item.


User Provisioning

If you plan to use the Group information in Okta to determine the user account type, start with the following steps. The groups you use in Okta don't have to start with Mac- but these steps use Mac- as an example.

  1.  In the Passport library item, in the User provisioning section, click the User account type menu and select Specified per identity provider group.
  2. In the Identity provider group fields, enter your Okta group names. This article uses groups that start with Mac- as an example.
  3. For each Identity provider group row, set the Account type as appropriate.


Next, In Okta, in your Passport OIDC application, use the following steps to configure the Group claim filter to start with Mac- as an example.

  1. In your Okta Administrator Console, in the left menu pane, expand the Applications section if necessary, then select Applications.

  2. Select your Kandji Passport application that you previously created.

  3. Click the Sign On tab.

  4. In the OpenID Connect ID Token section, click Edit.

  5. In the Group claims filter section, leave the default value: groups.

  6. Leave the middle field at the default: Starts with.

  7. In the right-most field, enter Mac (assuming the Okta groups you use or will use start with Mac).

  8. Click Save.