Hello there!

Need Help? We are right here!

Support Icon
miniOrange Email Support
success

Thanks for your Enquiry. Our team will soon reach out to you.

If you don't hear from us within 24 hours, please feel free to send a follow-up email to info@xecurify.com

Search Results:

×

Configure Okta as SAML or OAuth IDP for SSO


miniOrange Identity Broker service solution enables cross protocol authentication. You can configure Okta as an IDP for Single Sign-On (SSO) into your applications/websites. Here, Okta will act as an Identity Provider (IDP) and miniOrange will act as a broker.

We offer a pre-built solution for integrating with Okta, making it easier and quick to implement. Our team can also help you set up Okta as SAML or OIDC IDP to login into your applications.

Get Free Installation Help


miniOrange offers free help through a consultation call with our System Engineers to configure SSO for different apps using OpenAthens as IDP in your environment with 30-day free trial.

For this, you need to just send us an email at idpsupport@xecurify.com to book a slot and we'll help you in no time.



Prerequisites

Please make sure your organisation branding is already set under Customization >> Login and Registration Branding in the left menu of the dashboard.


Follow the Step-by-Step Guide given below for Okta Single Sign-On (SSO)

Step 1: Configure miniOrange as SP in Okta

Mentioned below are steps to configure Okta as IDP via SAML and OAuth configuration. Follow the steps accordingly based on your requirement (SAML or OAuth).


    Follow the steps to configure Okta as SAML IdP configuration.

  • Go to miniOrange Admin Console.
  • From the left navigation bar select Identity Providers.
  • Click on the Add Identity Provider button.
  • Okta as SAML IdP : Go to Identity Providers click Add Identity Provider

  • Now click on the Click here link to get miniorange metadata, as shown in the image below.
  • Okta as IDP, Click here link

  • For SP - Initiated SSO section, select Show Metadata Details.
  • Okta SAML IDP : SP intiated Metadata

  • Copy Entity ID or Issuer and ACS URL (For SP-Initiated SSO) values and keep them handy. This will require configuring the application on the Okta side.
  • Okta SAML IDP : Keep it handy SP Metadata details

  • Now go to Okta site and login to your Okta admin dashboard.
  • Then click on the Applications from the side-panel and then select Applications.
  • Click on the Create App Integration button.
  • Configure Okta as SAML IDP : Click on Applications >> Applications

  • Select SAML 2.0 as Sign-in method and click on the Next button.
  • Okta as SAML IDP : Select SAML 2.0

  • In the General Settings tab, enter the App name and click on Next button.
  • Okta as SAML IDP : Enter App aame and click next

  • In the Configure SAML tab of Okta, enter the following required details:
    Single sign-on URL ACS (Assertion Consumer Service) URL from SP-INITIATED SSO section of the miniOrange
    Audience URI (SP Entity ID) Entity ID or Issuer from SP-INITIATED SSO section of the miniOrange
    Default RelayState (Optional) This is the URL where you want to redirect your users after SSO.
    Name ID format Select EmailAddress as a Name ID Format from the drop-down list
    Application username Okta username
  • Configure Okta as SAML IDP : Enter ACS URL and Entity ID or Issuer

  • Configure Attribute Statements and Group Attribute Statements (Optional) then click on Next button.
  • Configure Okta as SAML IDP : Add Attribute Statements

  • Click on Next then Finish.
  • Navigate to Assignments tab from Okta.
  • Click on Assign & select Assign to People. Select the user from the popup & click on Done. You can also assign groups if required.
  • Configure Okta as SAML IDP : Go to Assignment tab and click Assign >> select Assign to People

    Configure Okta as SAML IDP : Click on Assign link

  • Navigate to the Sign On tab.
  • Configure Okta as SAML IDP : Click on Sign On tab

  • Click on the More details option to see the metadata details.
  • Copy the Metadata URL, which is required in Step 2 to configure Okta within miniOrange.
  • Configure Okta as SAML IDP : Copy Metadata URL and Keep it handy

    Follow the steps to configure Okta as IdP by OAuth configuration.

  • Go to miniOrange Admin Console.
  • From the left navigation bar select Identity Providers >> click Add Identity Provider.
  • Okta SSO : Go to Identity Providers

  • Select OAuth 2.0.
  • Now copy the OAuth Callback URL which we will use to configure Okta as OAuth Server/Provider.
  • Okta Single Sign On : Select OAuth 2.0

  • Now go to Okta site and login to your Okta admin dashboard.
  • Then click on the Applications from the side-panel and then select Applications.
  • Click on the Create App Integration button.
  • Configure Okta as SAML IDP : Go to Applications and click Create App Integration

  • Select OIDC - OpenID Connect as Sign-in method and Web Application as Application type. Click Next.
  • Configure Okta as SAML IDP : Choose OIDC - OpenID Connect

  • You will be redirected to the app details page. Enter App integration name and Sign-in redirect URIs, which we copied as OAuth Callback URL from miniOrange.
  • Configure Okta as SAML IDP : Enter Appname and Callback

  • Scroll down and you will see the Assignments section. Select an option for Controlled access as Allow everyone in your organization to access, untick the Enable immediate access with Federation Broker Mode and then click on Save button.
  • Configure Okta as SAML IDP : Scroll to Assignment and select controlled access

  • Now you will get the Client ID and Client Secret. Keep these credentials handy for configuring miniOrange OAuth Client Single Sign-On (SSO).
  • Configure Okta as SAML IDP : Copying the client id and client secret

  • Copy domain name: From right top header, you will get your domain name. Keep the domain name handy.
  • Configure Okta as SAML IDP : To get Okta Domain name

Fetch Okta Groups:

  • Click on the Sign On tab in your Okta application.
  • Configure Okta as SAML IDP : Go to Sign On tab

  • Scroll to OpenID Connect ID Token section.
  • Under the Group Claims Filter section, enter groups as the default name, and then select Matches regex from the drop down list and enter .* (without spaces) to return all the user's groups.
  • Configure Okta as SAML IDP : Scroll down to OpenID Connect ID Token

  • Click on the Save button.

Profile Attributes for the ID Token:

  • Go to Okta Admin dashboard >> Security >> API.
  • Click on Add Authorization Server button.
  • After creating a new Authorization Server, click on the Edit icon, as shown below.
  • Configure Okta as SAML IDP : Go to Security and click API to add Authorization Server

  • Go to Claims tab and select the ID token option.
  • Configure Okta as SAML IDP : Click on Claims and select ID token

  • Click on Add claim button.
  • Give a Name to your claim/ attribute, and select the ID Token from Include in token type dropdown. Now, enter the value user.$attribute in the Value field based on the attribute you want to receive. Keep other settings as default.
  • Configure Okta as SAML IDP : Add Claims

  • Click Create button.

Follow the same steps for all the attributes you want to see.


2. Configure Okta as IDP in miniOrange


  • Go to miniOrange Admin Console.
  • From the left navigation bar select Identity Providers.
  • Click on Add Identity Provider button.
  • Add Identity Provider to configure SSO

  • Click on Import IDP metadata.
  • Select SAML to configure  as IDP

  • Enter IDP Name. Select URL radio button and enter the copied URL from Okta.
  • Click on Import.
  • Okta as IdP Import Matadata

  • A few other optional features that can be added to the Identity Provider (IDP) are listed in the table below:
    Domain Mapping Can be used to redirect specific domain user to specific IDP
    Show IdP to Users Enable this if you want to show this IDP to all users during Login
    Send Configured Attributes Enabling this would allow you to add attributes to be sent from IDP
    X.509 Certificate X.509 Certificate from Okta
  • Okta as IDP: Mapping

  • Click on Save button.
  • Go to miniOrange Admin Console.
  • From the left navigation bar select Identity Providers >> Add Identity Provider. Select OAuth 2.0.
  • Okta SSO : Select Identity Providers

    Select OAuth to setup Okta as IDP : Select OAuth 2.0

  • Enter the following values.
    IdP Name Custom Provider (if your app name is not listed here)
    IdP Display Name Choose appropriate Name (Like Okta)
    OAuth Authorize Endpoint https://{yourOktaDomain}.com/oauth2/default/v1/authorize
    OAuth Access Token Endpoint https://{yourOktaDomain}.com/oauth2/default/v1/token
    OAuth Get User Info Endpoint (optional) https://{yourOktaDomain}/oauth2/default/v1/userinfo
    Client ID Copied from above stpes
    Client secret Copied from above stpes
    Scope openid profile email

3. Test Connection

  • Visit your Login Page URL.
  • Go to Identity Providers tab.
  • Click on Select >> Test Connection option against the Identity Provider (IDP) you configured.
  • Okta-IDP-TestConnection

  • On entering valid Okta credentials (credentials of user assigned to app created in Okta), you will see a pop-up window which is shown in the below screen.
  • SucessTestConn-Okta-IDP

  • Hence your configuration of Okta as IDP in miniOrange is successfully completed.

Note:

You can follow this guide, if you want to configure SAML/WS-FED, OAuth/OIDC, JWT, Radius etc


Configure Attribute Mapping

  • Go to Identity Providers >> View Identity Providers >> Your configured Okta as IdP.
  • Now click on Select and then Configure Attribute Mapping of your application.
  • Okta Single Sign-On SSO Select and Configure Attribute Mapping

  • Under Attribute Type - EXTERNAL for the external attributes that need to be transformed and sent to applications or service providers.
  • Click on the + Add Attribute button to add the attribute fields.
  • Okta Single Sign-On SSO Map External Attribute

  • Check attributes in test connection window from last step. Enter the attribute names (any name) that you want to send to your application under Attribute Name sent to SP.
  • Enter the value of attributes that are coming from IdP into the Attribute Name from IdP field on the Xecurify side.

Setup Multiple IDPs (Optional)

  • You can configure multiple IDPs (Identity Providers) and give users the option to select the IDP of their choice to authenticate with.
    For Example - It could be multiple AD domains belonging to different departments or multiple okta organizations.
  • Few usecases where customers configure multiple IDPs -

  • Suppose you have a product which many of your clients use and each client has their own unique IDP so you want them to SSO into your product as well using their existing IDP only. miniOrange provides a centralized way to connect with all IDPs in a very easy manner and integrate SSO into your application.
  • Suppose you are providing a course to many universities, each having a unique SAML, OAuth protocol supported IDP's like Shibboleth, ADFS, CAS, etc. You can provide Single Sign-On (SSO) into your course application to all these universities by integrating with all of them using a single platform provided by miniOrange.
  • This is the endpoint to call from your SAML application -
  • For Cloud IDP - https://login.xecurify.com/moas/discovery?customerId=<customer_id>
    For On-Premise IDP - https://yourdomain.com/discovery?customerId=<customer_id>

  • You should copy the Customer Key from admin console-> Settings -> and replace it with <customer_id> here. Once configured in SP, when you initiate the login from Service Provider, a user will be redirected to IDP Selection Page listing all IDPs configured for that account.
  • You can see the screenshot below of the IDP Selection Page with a list of IDPs.


    Note: To view the IDP in drop-down list, go to Identity Providers tab > against your configured IDP > Select >Edit , here Enable the Show IdP to Users option.

    Select your IDP (Identity Provider) to login

  • You also have the option to modify the appearance and design of this page. Login to miniOrange Admin console. Navigate to Customization -> Branding Configuration. See the below screenshot for reference-

  • Customize IDP selection login page

  • You can customize the title of this page.
  • Change the logo and favicon for this page.
  • Change the background and button color for this page from admin UI.

Troubleshooting

You receive these error message when you try to SSO in to an application that has been set up to use Okta as External IdP using SAML or OAuth based Single Sign-On (SSO).

Facing Issue - Page Can't Be Found

If you face page can’t be found issue while performing Test Connection or SSO, then you can verify the ACS/Login URL of miniOrange in your Okta.

Okta as IDP: Page can't Found

Error 404 - Page Not Found

If you face 404 Page Not Found issue while performing Test Connection or SSO, then you can verify the ACS/Login URL of Okta into the miniOrange app.

Okta as IDP: Error 404 - Page can't Found

Invalid Certificate Issue

If you face an invalid certificate issue, you can check the x.509 certificate entered in the miniOrange app with the certificate of your IdP (Okta).

Okta as IDP: Invalid Certificate

Stuck in the Login Loop

After SSO, if you are stuck in the login loop, then please confirm the attribute mapping.

Follow the below steps for the same:
  • Go to Identity Providers > Select > Test Connection.
  • Okta as IDP: Test Connection

    Okta as IDP: Attribute Lists

Now configure Attribute Mapping.
  • Go to Identity Providers > Select > Configure Attribute Mapping.
  • Okta as IDP: Configure JIT Attribute Mapping

  • Map the attributes that are coming from your source IdP. In your case, Okta.
  • Okta as IDP: Map Attributes

Error 403 - App Not Assigned

If you face the 403 App Not Assigned issue, it means you are trying to perform the SSO for that user who is not assigned to that application on your Okta side

Okta as IDP: Error 403 - App Not Assigned

To fix this issue, follow the below steps:
  • Go to your Okta site.
  • Navigate to Assignments >> Assign >> Assign to People.
  • Search for the user you want to assign. Click on Assign.
  • Click the Assign and Go Back button.
  • Click on Done.
  • It will assign that user to access that application.
  • Now perform the SSO, and it will resolve the issue.
  • Okta as IDP: Assign People and Try SSO


External References

Want To Schedule A Demo?

Request a Demo
  



Our Other Identity & Access Management Products