Tutorial: Integrate Okta with Access Server via LDAP
Configuring Okta to integrate with Access Server can be done with LDAP. This requires requesting the LDAP Interface feature added to your Okta account.
Overview
Configuring Okta to integrate with Access Server can be done with LDAP. This requires requesting the LDAP Interface feature added to your Okta account.
The following pieces will make up the LDAP integration between Okta and Access Server:
- An active LDAP Interface in your Okta directory integrations. 
- An Okta Read-Only admin account as your bind user. 
- Defining the configuration for the bind in Access Server. 

- An installed Access Server. 
- An Okta directory. 
- Sign in to the Okta Admin Console with Super admin privileges. 
- Click Directory > People. 
- Click Add Person and enter a username to distinguish them as the LDAP bind user. 
- After activating the user, click Security > Administrators. 
- Click Add Administrator and type your new user's name in the Grant administrator role to field. 
- Click Read Only Administrator. 
- Click Add Administrator. 
- Sign in to the Okta Admin Console with Super admin privileges. 
- Click Directory > Directory Integrations. 
- Click Add LDAP Interface. - Tip- If this isn't an option, you must request it from Okta Support. 
- From the LDAP Interface page, you'll find most of the settings necessary for the configuration in Access Server.  
- Sign in to your Admin Web UI. 
- Click Authentication. - The General Settings tab displays. 
 
- Click the LDAP tab. 
- Set Enable LDAP authentication to Enabled. 
- Fill out the LDAP settings: - Connect to LDAP servers with SSL - On - Primary server - Host Name: <org_subdomain>.ldap.okta.com - Authenticate with username/password for initial bind - On - Bind DN username - The username for your Okta bind user. - Password - Enter the bind user's Okta password. - Base DN for user entries - OU=Users, DC=<org_subdomain>, DC=okta, DC=com - Username Attribute - uid - LDAP filter - Add additional parameters here, for instance, searching for members of a specific group, for example: memberOf=CN=<group>, OU=groups, DC=<org_subdomain>, DC=okta, DC=com 
- Click Save and Restart.