diff --git a/docs/sources/setup-grafana/configure-security/configure-authentication/okta/index.md b/docs/sources/setup-grafana/configure-security/configure-authentication/okta/index.md index 20d1ee803f2..2aaef56a35c 100644 --- a/docs/sources/setup-grafana/configure-security/configure-authentication/okta/index.md +++ b/docs/sources/setup-grafana/configure-security/configure-authentication/okta/index.md @@ -79,6 +79,8 @@ To follow this guide, ensure you have permissions in your Okta workspace to crea 1. Click **Save**. 1. Click the **Back to applications** link at the top of the page. 1. From the **More** button dropdown menu, click **Refresh Application Data**. +1. Include the `groups` scope in the **Scopes** field in Grafana of the Okta integration. + For Terraform or in the Grafana configuration file, include the `groups` scope in `scopes` field. #### Optional: Add the role attribute to the User (default) Okta profile @@ -161,12 +163,7 @@ To integrate your Okta OIDC provider with Grafana using our Okta OIDC integratio 1. Review the list of other Okta OIDC [configuration options]({{< relref "#configuration-options" >}}) and complete them as necessary. -1. Optional: [Configure a refresh token]({{< relref "#configure-a-refresh-token" >}}): - - a. Extend the `scopes` field of `[auth.okta]` section in Grafana configuration file with the refresh token scope used by your OIDC provider. - - b. Enable the [refresh token]({{< relref "#configure-a-refresh-token" >}}) at the Okta application settings. - +1. Optional: [Configure a refresh token]({{< relref "#configure-a-refresh-token" >}}). 1. [Configure role mapping]({{< relref "#configure-role-mapping" >}}). 1. Optional: [Configure team synchronization]({{< relref "#configure-team-synchronization-enterprise-only" >}}). 1. Restart Grafana.