Using Okta as the IdP
SAML Authentication
To integrate SAML with Okta as the IdP, you must first configure the SAML2.0 application in Okta. For information, refer to the Okta documentation.
To se the SAML groups attribute, complete the following:
Navigate to Group Attribute Statement, and set the following:
Set name to groups
Set name format to unspecified
Set filter to "Matches Regex .*" (or any regex you wish)
The following table lists the required parameters for a successful integration:
Parameter | Description | Usage |
---|---|---|
Entity ID (Service Provider) | The Entity ID is the audience URI for setting up the basic SAML configuration. |
|
Assertion Consumer Service URL (Service Provider) | The Assertion Consumer Service (ACS) URL directs your IdP where to send the SAML response after authenticating a user. |
|
Metadata URL (IdP) | The IdP Metadata URL directs you to the XML file that contains the IdP information you need to set up the connection with the IdP. You do not need to enter other details separately if you can obtain the XML file. |
|
Issuer (IdP) | The IdP Issuer is the URL that defines the unique identifier for your SAML application. |
|
SSO URL (IdP) | The IdP SSO URL redirects the service provider to Azure AD to authenticate and sign on the user. |
|
Signing Certificate (IdP) | The IdP Signing Certificate ensures that data is coming from the expected IdP and service provider. The certificate is used to sign SAML requests, responses, and assertions from the service to relying applications. |
|
OpenID Connect Authentication
To integrate OpenID Connect with Okta as the IdP, you must first configure a new OpenID Connect application in Okta. For information, refer to the Okta documentation.
To configure users and groups, complete the following:
- Navigate to Assignment and select the users/groups that are allowed to use the application.
Note
To reduce the scope of returned groups, you can use the Groups Claim Regex.
The following table lists the required parameters for a successful integration:
Parameter | Description | Usage |
---|---|---|
Login Redirect URI (Client) | The Redirect URI determines where the authorization server redirects the user once the application successfully authorizes and grants an authorization code or access token. |
|
Client ID (Client) | The Client ID is the ID for logging in to the IdP client. |
|
Client Secret (Client) | The Client Secret is the password for logging in to the IdP client. |
|
Issuer (IdP) | The Issuer is the URL that defines the unique identifier for your OpenID Connect application. |
|