Articles in this section

How to setup SSO with OKTA

This article describes how an organization can set up SSO on Okta utilizing the SAML2 protocol. The Templafy application is available in the Okta portal and comes with out-of-the-box SAML connectors and some pre-configured User Claims.

  Prerequisites

  • Administrator rights in Okta portal.

Step-by-Step Installation

  1. With Administrator rights, login to your Okta Admin Portal.
  2. Navigate to Applications.
  3. Select the Applications subsection.
  4. Click on Browse App Catalog.
  5. Use the search function and type Templafy in the search field.
  6. Confirm your selection by clicking Add when Templafy appears.
  7. Edit the General Settings according to your preferences and hit Done to add the application to your Gallery.

Obtain Metadata URL to Complete the Setup

  1. In the Templafy Application, navigate to the Sign On tab.
  2. Under Advanced Sign-On Settings, check Upgrade to Templafy HIVE.
  3. Enter the Assertion Consumer Service value corresponding to your cluster.mceclip4.png 
    West Europe (Production 0) https://templafyprod0.auth.templafy.com/auth/saml2/auth-services/Acs
    West Europe (Production 1) https://templafyprod1.auth.templafy.com/auth/saml2/auth-services/Acs
    East US (Production 2) https://templafyprod2.auth.templafy.com/auth/saml2/auth-services/Acs
    East Australia (Production 3) https://templafyprod3.auth.templafy.com/auth/saml2/auth-services/Acs
    Canada (Production 4) https://templafyprod4.auth.templafy.com/auth/saml2/auth-services/Acs
    West Europe (Production 5) https://templafyprod5.auth.templafy.com/auth/saml2/auth-services/Acs
  4. Next, click on the View SAML Setup Instructions.
    mceclip4.png

  5. In the new tab that opens, locate the Configuration Steps subsection.
  6. Copy the Metadata URL from Step 2.

    mceclip8.png

  7. Provide the URL to your Templafy Implementation Partner.

Congratulations! You have now completed the basic setup.

Configure User Profile Mappings

  1. In Okta Admin portal locate the Directory tab.
  2. Navigate to Profile Editor
  3. Search for the Templafy app, then click on the name of the app
  4. Select Add Attribute.
  5. Enter the following required fields: 
    • Display Name: Enter a preferred attribute name. 
    • Variable Name: Variable names are pre-defined and case sensitive.
      • title
      • mobilePhone
      • primaryPhone
      • streetAddress
      • city
      • state
      • zipCode
      • preferredLanguage
      • department
      • country

mceclip7.png

  Note

15 custom claims are also supported via Okta, following the example below:

    • Name: http://schemas.templafy.com/2016/06/identity/claims/customclaim4
    • Name format: Basic
    • Value: appuser.customClaim4

            

 

Once the schemas have been input, the attributes can be added as illustrated in Step 5 above (ex. Display & Variable Name = customClaim4). Then, the custom claims will be available for Step 7 below.

6. Complete the action by either clicking Save or Save an Add Another, if you wish to continue adding more attributes.

7. Once you have added all attributes you want to send to Templafy, click on Mappings to map them against attributes from the Okta Base User profile.

8. In the Mappings section select Okta User to Templafy.

9. Start typing the required attribute from the Okta Base User profile (or use the dropdown list) and select the attributes you want to map.

10. In a similar manner continue to do so until all attributes have been mapped.

11. To ensure claims are regularly updated select the option Apply mapping on user create and update.
mceclip1.png

12. Review the mappings and confirm the setup by clicking Save Mappings.

13. Now that mappings are saved, hit Apply updates now to pass the attributes with their respective values from the Okta Base User Profile to Templafy.

Configure Group Claims

If you wish to pass Okta groups as part of the SAML response, please follow these steps: 

  1. In Okta, look up the Templafy App in the Applications directory
  2. Navigate to the Sign On tab of the App, then click Edit.
  3. Select your preferred group filter from the dropdown list.
  4. Select Matches regex and enter .* in order to send all Okta groups to Templafy.
  5. Click Save.

    mceclip11.png
SSO authentication okta
Was this article helpful?
0 out of 0 found this helpful

Comments

0 comments

Article is closed for comments.