diff --git a/src/pages/selfhosted/identity-providers/authentik.mdx b/src/pages/selfhosted/identity-providers/authentik.mdx
index 34a1eb09..7b6220c3 100644
--- a/src/pages/selfhosted/identity-providers/authentik.mdx
+++ b/src/pages/selfhosted/identity-providers/authentik.mdx
@@ -4,9 +4,9 @@ import {Note} from "@/components/mdx";
[Authentik](https://goauthentik.io) is an open-source identity provider focused on flexibility and security. It serves as a self-hosted alternative to commercial solutions like Okta and Auth0, providing single sign-on (SSO), multi-factor authentication (MFA), access policies, user management, and support for SAML and OIDC protocols.
-## Connector Setup (Recommended)
+## Management Setup (Recommended)
-Add Authentik as a connector to the embedded IdP. This is the simplest approach and recommended for most deployments.
+Add Authentik as an external IdP directly in the NetBird Management Dashboard. This is the simplest approach and recommended for most deployments.
### Prerequisites
@@ -29,7 +29,7 @@ Add Authentik as a connector to the embedded IdP. This is the simplest approach
- **Authentication Flow**: `default-authentication-flow (Welcome to authentik!)`
- **Authorization Flow**: `default-provider-authorization-explicit-consent (Authorize Application)`
- **Client type**: `Confidential`
- - **Redirect URIs/Origins**: Leave empty for now (you'll add this after creating the connector in NetBird)
+ - **Redirect URIs/Origins**: Leave empty for now (you'll add this after adding the identity provider in NetBird)
- **Signing Key**: Select any cert present, e.g., `authentik Self-signed Certificate`
6. Click **Finish**
@@ -49,7 +49,7 @@ Add Authentik as a connector to the embedded IdP. This is the simplest approach
@@ -149,7 +156,7 @@ If you prefer to have full control over authentication, consider self-hosted alt
diff --git a/src/pages/selfhosted/identity-providers/managed/okta.mdx b/src/pages/selfhosted/identity-providers/managed/okta.mdx
index 601f789c..3d945834 100644
--- a/src/pages/selfhosted/identity-providers/managed/okta.mdx
+++ b/src/pages/selfhosted/identity-providers/managed/okta.mdx
@@ -4,16 +4,16 @@ import {Note} from "@/components/mdx";
[Okta](https://www.okta.com/) is a cloud-based identity and access management service for enterprise use, providing single sign-on, multi-factor authentication, and lifecycle management.
-## Connector Setup (Recommended)
+## Management Setup (Recommended)
-Add Okta as a connector to the embedded IdP. This is the simplest approach and recommended for most deployments.
+Add Okta as an external IdP directly in the NetBird Management Dashboard. This is the simplest approach and recommended for most deployments.
### Prerequisites
- NetBird self-hosted with embedded IdP enabled
- Okta Workforce Identity Cloud account
-### Step 1: Create OIDC Application in Okta
+### Step 1: Start Creating OIDC Application in Okta
1. Navigate to Okta Admin Dashboard
2. Click **Applications** → **Applications**
@@ -25,13 +25,16 @@ Add Okta as a connector to the embedded IdP. This is the simplest approach and r
6. Fill in:
- **App integration name**: `NetBird`
- **Grant type**: `Authorization Code`
- - Leave redirect URIs empty for now
-7. Click **Save**
-8. Note the **Client ID** and **Client Secret**
+ - Leave redirect URIs empty for now (you'll add this in Step 3)
+7. Under **Assignments**, select an option for controlled access:
+ - **Allow everyone in your organization to access** (recommended for testing)
+ - **Limit access to selected groups** (for production)
+ - **Skip group assignment for now** (assign later)
+8. **Don't click Save yet** — keep this tab open and proceed to Step 2
-### Step 2: Add Connector in NetBird
+### Step 2: Get Redirect URL from NetBird
-1. Log in to your NetBird Dashboard
+1. Open a new tab or window and log in to your NetBird Dashboard
2. Navigate to **Settings** → **Identity Providers**
3. Click **Add Identity Provider**
4. Fill in the fields:
@@ -40,27 +43,31 @@ Add Okta as a connector to the embedded IdP. This is the simplest approach and r
|-------|-------|
| Type | Okta |
| Name | Okta (or your preferred display name) |
-| Client ID | From Okta application |
-| Client Secret | From Okta application |
+| Client ID | From Okta application (will fill after Step 3) |
+| Client Secret | From Okta application (will fill after Step 3) |
| Issuer | Your Okta URL (e.g., `https://your-org.okta.com`) |
-5. Click **Save**
+5. **Copy the Redirect URL** that NetBird displays (but don't click **Add Provider** yet)
-### Step 3: Configure Redirect URI
+### Step 3: Complete Okta Application Setup
-After saving, NetBird displays the **Redirect URL**. Copy this URL and add it to your Okta application:
+1. Return to the Okta tab
+2. In the **Sign-in redirect URIs** field, paste the redirect URL you copied from NetBird
+3. Click **Save**
+4. Note the **Client ID** and **Client Secret** — you'll need these for Step 4
-1. Return to Okta Admin → **Applications** → **NetBird**
-2. Click **Edit** in the General Settings
-3. Add the redirect URL from NetBird to **Sign-in redirect URIs**
-4. Click **Save**
+### Step 4: Complete NetBird Setup
+
+1. Return to the NetBird tab
+2. Fill in the **Client ID** and **Client Secret** from Step 3
+3. Click **Add Provider**
### Step 4: Test the Connection
1. Log out of NetBird Dashboard
2. On the login page, you should see an "Okta" button
3. Click it and authenticate with your Okta credentials
-4. You should be redirected back to NetBird and logged in
+4. You should be redirected back to NetBird and logged in. Unless your user approval setting were changed you will need to log back into your local admin account to approve the user.
---
@@ -68,7 +75,7 @@ After saving, NetBird displays the **Redirect URL**. Copy this URL and add it to
Use Okta as your primary identity provider instead of NetBird's embedded IdP. This option gives you full control over authentication and user management, is recommended for experienced Okta administrators as it also requires additional setup and ongoing maintenance.
-For most deployments, the [embedded IdP](/selfhosted/identity-providers/local) is the simpler choice — it's built into NetBird, fully integrated, and requires minimal configuration to get started. For this implementation, go back up to the [Connector Setup (Recommended)](#connector-setup-recommended) section above.
+For most deployments, the [embedded IdP](/selfhosted/identity-providers/local) is the simpler choice — it's built into NetBird, fully integrated, and requires minimal configuration to get started. For this implementation, go back up to the [Management Setup (Recommended)](#management-setup-recommended) section above.