After configuring Okta as an OpenID Connect (OIDC) Identity Provider for VMware Cloud Foundation - Automation (VCFA), users are unable to log in. The authentication process fails, and users are returned to the login screen.
VCF Automation
Okta as an OIDC Identity Provider
This issue occurs when the OIDC provider configuration in VCFA does not include the $groups$ scope. The $groups$ scope is required to request the user's group membership information from Okta during the login process. Without this scope, VCFA cannot receive the necessary claims to map the user to an authorized role, causing the login to fail.
To resolve this issue, you must add the groups scope to your OIDC provider configuration within the VCF Automation (VCFA) portal. There are two paths to access this setting:
groups to the list. Scopes are space-delimited (e.g., openid email profile groups).groups).groups scope.After saving the updated configuration, users belonging to the appropriate Okta groups should be able to log in to VCF Automation successfully.