Hello there!

Need Help? We are right here!

Support Icon
miniOrange Email Support
success

Thanks for your Enquiry. Our team will soon reach out to you.

If you don't hear from us within 24 hours, please feel free to send a follow-up email to info@xecurify.com

Search Results:

×

Enable SSO with Okta as SAML IDP | Okta SSO Login


Configure Okta as an IDP for Single Sign-On (SSO) login into your application. miniOrange offers a pre-built solution for integrating Okta Single Sign On (SSO), making it easy to implement. Here Okta will act as an Identity Provider (IDP) and miniOrange will act as a broker, and other multiple applications will act as Service Provider (SP). Enabling SSO for your domain within help of miniOrange allows your Users to easily and securely log in to their accounts.

Whereas, you can setup Okta as SAML IdP to Single Sign-On into apps that support protocols like OAuth, OpenID Connect, JWT, etc. Our Identity Broker service enables cross protocol authentication.

Get Free Installation Help


miniOrange offers free help through a consultation call with our System Engineers to configure SSO for different apps using OpenAthens as IDP in your environment with 30-day free trial.

For this, you need to just send us an email at idpsupport@xecurify.com to book a slot and we'll help you in no time.



Prerequisites

  • Log into miniOrange Admin Console.
  • Click on Customization >> Login and Registration Branding in the left menu of the dashboard.
  • In Basic Settings, set the Organization Name as the custom_domain name.
  • Click Save. Once that is set, the branded login URL would be of the format https://<custom_domain>.xecurify.com/moas/login
  • Setting up Branding URL

Follow the Step-by-Step Guide given below for Okta Single Sign-On (SSO)

Step 1: Configure miniOrange as SP in Okta

Mentioned below are steps to configure Okta as IDP via SAML and OAuth configuration. Follow the steps accordingly based on your requirement (SAML or OAuth).


    Follow the steps to configure Okta as SAML IdP configuration.

  • Go to miniOrange Admin Console.
  • From the left navigation bar select Identity Providers.
  • Click on the Add Identity Provider button.
  • Okta as SAML IdP : Go to Identity Providers click Add Identity Provider

  • Now click on the Click here link to get miniorange metadata, as shown in the image below.
  • Okta as IDP, Click here link

  • For SP - Initiated SSO section, select Show Metadata Details.
  • Okta SAML IDP : SP intiated Metadata

  • Copy Entity ID or Issuer and ACS URL (For SP-Initiated SSO) values and keep them handy. This will require configuring the application on the Okta side.
  • Okta SAML IDP : Keep it handy SP Metadata details

  • Now go to Okta site and login to your Okta admin dashboard.
  • Then click on the Applications from the side-panel and then select Applications.
  • Click on the Create App Integration button.
  • Configure Okta as SAML IDP : Click on Applications >> Applications

  • Select SAML 2.0 as Sign-in method and click on the Next button.
  • Okta as SAML IDP : Select SAML 2.0

  • In the General Settings tab, enter the App name and click on Next button.
  • Okta as SAML IDP : Enter App aame and click next

  • In the Configure SAML tab of Okta, enter the following required details:
    Single sign-on URL ACS (Assertion Consumer Service) URL from SP-INITIATED SSO section of the miniOrange
    Audience URI (SP Entity ID) Entity ID or Issuer from SP-INITIATED SSO section of the miniOrange
    Default RelayState (Optional) This is the URL where you want to redirect your users after SSO.
    Name ID format Select EmailAddress as a Name ID Format from the drop-down list
    Application username Okta username
  • Configure Okta as SAML IDP : Enter ACS URL and Entity ID or Issuer

  • Configure Attribute Statements and Group Attribute Statements (Optional) then click on Next button.
  • Configure Okta as SAML IDP : Add Attribute Statements

  • Click on Next then Finish.
  • Navigate to Assignment tab from Okta.
  • Click on Assign & select Assign to People. Select the user from the popup & click on Done. You can also assign groups if required.
  • Configure Okta as SAML IDP : Go to Assignment tab and click Assign >> select Assign to People

    Configure Okta as SAML IDP : Click on Assign link

  • Navigate to the Sign On tab.
  • Configure Okta as SAML IDP : Click on Sign On tab

  • Click on the More details option to see the metadata details.
  • Copy the Metadata URL, which is required in Step 2 to configure Okta within miniOrange.
  • Configure Okta as SAML IDP : Copy Metadata URL and Keep it handy

    Follow the steps to configure Okta as IdP by OAuth configuration.

  • Go to miniOrange Admin Console.
  • From the left navigation bar select Identity Providers >> click Add Identity Provider.
  • Okta SSO : Go to Identity Providers

  • Select OAuth 2.0.
  • Now copy the OAuth Callback URL which we will use to configure Okta as OAuth Server/Provider.
  • Okta Single Sign On : Select OAuth 2.0

  • Now go to Okta site and login to your Okta admin dashboard.
  • Then click on the Applications from the side-panel and then select Applications.
  • Click on the Create App Integration button.
  • Configure Okta as SAML IDP : Go to Applications and click Create App Integration

  • Select OIDC - OpenID Connect as Sign-in method and Web Application as Application type. Click Next.
  • Configure Okta as SAML IDP : Choose OIDC - OpenID Connect

  • You will be redirected to the app details page. Enter App integration name and Sign-in redirect URIs, which we copied as OAuth Callback URL from miniOrange.
  • Configure Okta as SAML IDP : Enter Appname and Callback

  • Scroll down and you will see the Assignments section. Select an option for Controlled access as Allow everyone in your organization to access, untick the Enable immediate access with Federation Broker Mode and then click on Save button.
  • Configure Okta as SAML IDP : Scroll to Assignment and select controlled access

  • Now you will get the Client ID and Client Secret. Keep these credentials handy for configuring miniOrange OAuth Client Single Sign-On (SSO).
  • Configure Okta as SAML IDP : Copying the client id and client secret

  • Copy domain name: From right top header, you will get your domain name. Keep the domain name handy.
  • Configure Okta as SAML IDP : To get Okta Domain name

Fetch Okta Groups:

  • Click on the Sign On tab in your Okta application.
  • Configure Okta as SAML IDP : Go to Sign On tab

  • Scroll to OpenID Connect ID Token section.
  • Under the Group Claims Filter section, enter groups as the default name, and then select Matches regex from the drop down list and enter .* (without spaces) to return all the user's groups.
  • Configure Okta as SAML IDP : Scroll down to OpenID Connect ID Token

  • Click on the Save button.

Profile Attributes for the ID Token:

  • Go to Okta Admin dashboard >> Security >> API.
  • Click on Add Authorization Server button.
  • After creating a new Authorization Server, click on the Edit icon, as shown below.
  • Configure Okta as SAML IDP : Go to Security and click API to add Authorization Server

  • Go to Claims tab and select the ID token option.
  • Configure Okta as SAML IDP : Click on Claims and select ID token

  • Click on Add claim button.
  • Give a Name to your claim/ attribute, and select the ID Token from Include in token type dropdown. Now, enter the value user.$attribute in the Value field based on the attribute you want to receive. Keep other settings as default.
  • Configure Okta as SAML IDP : Add Claims

  • Click Create button.

Follow the same steps for all the attributes you want to see.


2. Configure Okta as IDP in miniOrange


  • Go to miniOrange Admin Console.
  • From the left navigation bar select Identity Providers.
  • Click on Add Identity Provider button.
  • Add Identity Provider to configure SSO

  • Click on Import IDP metadata.
  • Select SAML to configure  as IDP

  • Enter IDP Name. Select URL radio button and enter the copied URL from Okta.
  • Click on Import.
  • Okta as IdP Import Matadata

  • A few other optional features that can be added to the Identity Provider (IDP) are listed in the table below:
    Domain Mapping Can be used to redirect specific domain user to specific IDP
    Show IdP to Users Enable this if you want to show this IDP to all users during Login
    Send Configured Attributes Enabling this would allow you to add attributes to be sent from IDP
    X.509 Certificate X.509 Certificate from Okta
  • Okta as IDP: Mapping

  • Click on Save button.
  • Go to miniOrange Admin Console.
  • From the left navigation bar select Identity Providers >> Add Identity Provider. Select OAuth 2.0.
  • Okta SSO : Select Identity Providers

    Select OAuth to setup Okta as IDP : Select OAuth 2.0

  • Enter the following values.
    IdP Name Custom Provider (if your app name is not listed here)
    IdP Display Name Choose appropriate Name (Like Okta)
    OAuth Authorize Endpoint https://{yourOktaDomain}.com/oauth2/default/v1/authorize
    OAuth Access Token Endpoint https://{yourOktaDomain}.com/oauth2/default/v1/token
    OAuth Get User Info Endpoint (optional) https://{yourOktaDomain}/oauth2/default/v1/userinfo
    Client ID Copied from above stpes
    Client secret Copied from above stpes
    Scope openid profile email

3. Test Connection

  • Login to your Branding URL.
  • Go to Identity Providers tab.
  • Click on Select >> Test Connection option against the Identity Provider (IDP) you configured.
  • Okta-IDP-TestConnection

  • On entering valid Okta credentials (credentials of user assigned to app created in Okta), you will see a pop-up window which is shown in the below screen.
  • SucessTestConn-Okta-IDP

  • Hence your configuration of Okta as IDP in miniOrange is successfully completed.

4. Configure Your application in miniOrange


Note:

If you have already configured your application in miniOrange you can skip the following steps.





  • Click on Create App under SAML.
  • Click on Create SAML App

  • Search for your Application. In case you do not find your app, search for Custom SAML App.
  • Search for your SAML App

    Configure SAML Application

  • Get the ACS URL and SP Entity ID from your application.
  • Enter the following values OR click on Import SP Metadata:
  • Service Provider Name Choose appropriate name according to your choice
    SP Entity ID or Issuer Your Application Entity ID
    ACS URL X.509 Certificate (optional) Your Application Assertion Consumer Service URL
    NameID format  Select urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress
    Response Signed Unchecked
    Assertion Signed Checked
    Encrypted Assertion Unchecked
    Group policy Default
    Login Method
  • Click on Save to configure your application.
  • Now to get the IDP metadata of the app configured, Go to apps >> your_app >> select >> metadata tab.
  • Go to the metadata section

  • Click on the Show Metadata details in the Information required to Authenticate via External IDPs section. Download the metadata XML file by clicking on Download Metadata button or copy the Metadata URL link.
  • Downlaod metadata - URL

  • You need to Upload this metadata in your application.
  • Click on Create App under OAuth/OIDC. Click on Open ID Connect App .
  •  Add OAuth openIDConnect app

  • You can add any OAuth Client app here to enable miniOrange as OAuth Server. Few popular OAuth client apps for single sign-on are Salesforce, WordPress, Joomla, Atlassian, etc.
  • Select your OAuth openIDConnect app

    Configure OAth AddopenIDConnect app

  • Enter following Values:
  • Client Name Add appropriate Name
    Redirect URL Get the Redirect-URL from your OAuth Client
    Description Add if required
    Group Name Default
    Policy Name
    Login Method
  • Click on Save
  • Now to provide the required data to OAuth client go to the app configured i.e apps >> your_app >> select >> edit.
  • Edit OAuth editOpenidConnect app

    OAuth openidConnect app endpoints

    Note: Choose the Authorization Endpoint according to the identity source you configure.

  • When you want to use you want to use miniOrange as OAuth identity server use this endpoint: https://{mycompany.domainname.com}/moas/idp/openidsso
  • If you are configuring any Identity Provider in Identity Providers Menu and not using miniOrange as IDP use this endpoint: https://{mycompany.domainname.com}/broker/login/oauth{customerid}
  • Click on Create App under JWT.
  • Click n External JWT app

  • Select JWT App.
  • SelectJWT app

  • Configure the name for your application and configure Redirect-URL which tells where to send JWT response. Redirect-URL should be an endpoint on your application where you want to achieve SSO.
  • Configure JWT App

    In case you are setting up SSO with Mobile Applications where you can't create an endpoint for Redirect or Callback URL, use below URL.

    https://login.xecurify.com/moas/jwt/mobile

  • Click Save
  • To get the SSO link for your application, Go to Apps >> your_app >> select >> Edit.
  • Get SSO Link

  • Then, copy the Single Sign On Url and verify SSO setup by browsing that url.
  •  SSO URL

  • On successful authentication, you will be redirected to configured Redirect or Callback URL with JWT token
  • You will need to download a certificate from App > Manage Apps, and click Certificate link against your configured application. This certificate will be used for signature validation of JWT response.
  • Download certificate to proceed with SSO

5. Setup Multiple IDPs (Optional)

  • You can configure multiple IDPs (Identity Providers) and give users the option to select the IDP of their choice to authenticate with.
    For Example - It could be multiple AD domains belonging to different departments or multiple okta organizations.
  • Few usecases where customers configure multiple IDPs -

  • Suppose you have a product which many of your clients use and each client has their own unique IDP so you want them to SSO into your product as well using their existing IDP only. miniOrange provides a centralized way to connect with all IDPs in a very easy manner and integrate SSO into your application.
  • Suppose you are providing a course to many universities, each having a unique SAML, OAuth protocol supported IDP's like Shibboleth, ADFS, CAS, etc. You can provide Single Sign-On (SSO) into your course application to all these universities by integrating with all of them using a single platform provided by miniOrange.
  • This is the endpoint to call from your SAML application -
  • For Cloud IDP - https://login.xecurify.com/moas/discovery?customerId=<customer_id>
    For On-Premise IDP - https://yourdomain.com/discovery?customerId=<customer_id>

  • You should copy the Customer Key from admin console-> Settings -> and replace it with <customer_id> here. Once configured in SP, when you initiate the login from Service Provider, a user will be redirected to IDP Selection Page listing all IDPs configured for that account.
  • You can see the screenshot below of the IDP Selection Page with a list of IDPs.


    Note: To view the IDP in drop-down list, go to Identity Providers tab > against your configured IDP > Select >Edit , here Enable the Show IdP to Users option.

    Select your IDP (Identity Provider) to login

  • You can also change the look and feel of this page. Login to miniOrange Admin console. Navigate to Customization -> Branding Configuration. See the below screenshot for reference-

  • Customize IDP selection login page

  • You can customize the title of this page.
  • Change the logo and favicon for this page.
  • Change the background and button color for this page from admin UI.

Troubleshooting

You receive these error message when you try to SSO in to an application that has been set up to use Okta as External IdP using SAML-based Single Sign-On (SSO).

Facing Issue - Page Can't Be Found

If you face page can’t be found issue while performing Test Connection or SSO, then you can verify the ACS/Login URL of miniOrange in your Okta.

Okta as IDP: Page can't Found

Error 404 - Page Not Found

If you face 404 Page Not Found issue while performing Test Connection or SSO, then you can verify the ACS/Login URL of Okta into the miniOrange app.

Okta as IDP: Error 404 - Page can't Found

Invalid Certificate Issue

If you face an invalid certificate issue, you can check the x.509 certificate entered in the miniOrange app with the certificate of your IdP (Okta).

Okta as IDP: Invalid Certificate

Stuck in the Login Loop

After SSO, if you are stuck in the login loop, then please confirm the attribute mapping.

Follow the below steps for the same:
  • Go to Identity Providers > Select > Test Connection.
  • Okta as IDP: Test Connection

    Okta as IDP: Attribute Lists

Now configure JIT Attribute Mapping.
  • Go to Identity Providers > Select > Test Connection.
  • Okta as IDP: Configure JIT Attribute Mapping

  • Map the attributes that are coming from your source IdP. In your case, Okta.
  • Okta as IDP: Map Attributes

Error 403 - App Not Assigned

If you face the 403 App Not Assigned issue, it means you are trying to perform the SSO for that user who is not assigned to that application on your Okta side

Okta as IDP: Error 403 - App Not Assigned

To fix this issue, follow the below steps:
  • Go to your Okta site.
  • Navigate to Assignments >> Assign >> Assign to People.
  • Search for the user you want to assign. Click on Assign.
  • Click the Assign and Go Back button.
  • Click on Done.
  • It will assign that user to access that application.
  • Now perform the SSO, and it will resolve the issue.
  • Okta as IDP: Assign People and Try SSO


External References

Want To Schedule A Demo?

Request a Demo
  



Our Other Identity & Access Management Products