SSO - Okta
Overview
This article describes how to configure Okta as your workplace's single sign-on identity provider (IdP). This process involves making modifications to your Okta environment as well as your digital workplace. Once complete, users of your digital workplace will be able to sign in to it using their Okta credentials.
To follow this process, you must be able to add applications to your Okta environment and be a workplace administrator in your digital workplace.
Go to one of the following sections in this article:
- Configuring Okta single sign-on
- Configuring your digital workplace's single sign-on
- Verifying that single sign-on is set up correctly
- Troubleshooting issues
- Additional resources
Configuring Okta single sign-on
Follow these steps to configure the Igloo application in Okta. This application will pass the attributes Email, FName, and LName. Additionally, it assumes that you are using the default Okta username format that corresponds to a user's email address.
- Go to your Okta portal.
- In the Admin Console, select Applications followed by Applications.
- Above the list of applications, select Browse App Catalog.
- In the Search text box, enter
Igloo
. - From the list of application search results, select Igloo.
- On the Igloo application page, select Add.
- Configure the options on the General Settings tab as follows:
- Application label: Enter a name for this application.
- Login URL: Enter your digital workplace URL with /saml.digest appended to it (e.g., https://customercare.igloosoftware.com/saml.digest).
- Application Visibility: Select the options that follow your organization's best practices.
- Browser plugin auto-submit: Select Automatically log in when user lands on login page (selected by default).
- Select Next.
- On the Sign-On Options tab, right-click View Setup Instructions and open the link in a new tab.
- On the Sign-On Options tab, select Done to complete setting up the application.
- From the Setup Instructions tab that you opened in 9, copy the following values to use when configuring single sign-on in your digital workplace:
- IdP Login URL
- Public Certificate
Configuring your digital workplace's single sign-on
- Go to your digital workplace and sign in.
- Select Control Panel.
- Under Membership, select Sign In Settings.
- Select Configure SAML Authentication.
- Configure these General Configuration options as follows:
- Connection Name: Enter a name for this connection.
- IdP Login URL: Copy and paste the IdP Login URL from the Okta Setup Instructions into this field.
- IdP Logout URL: Leave this field blank; single logout (SLO) with Okta is not supported.
- Logout Response and Request HTTP Type: Ignore this option; single logout (SLO) with Okta is not supported.
- Logout Final Redirect URL: Enter the URL of the location you want to send users to when they log out. If left blank, users will be redirected to your digital workplace's homepage.
- Binding Type: Select POST.
- Public Certificate: Copy and paste the Public Certificate from the Okta Setup Instructions into this field.
- Configure these Response and Authentication Configuration options as follows:
- Identity Provider: Select Okta.
- Identifier Type: Select Email.
- Email Attribute: Enter
Email
. - First Name Attribute: Enter
FName
. - Last Name Attribute: Enter
LName
. - Drift Time: Enter
5
.
- For User creation on Sign in, select how your digital workplace handles users who attempt to sign in to your digital workplace when they have valid Okta credentials but are not members of the workplace. If your digital workplace uses the ILST to manage members, select Do not create new users when they sign in to avoid the creation of duplicate user accounts.
- For Sign in Settings, select how users sign in to your workplace using Okta single sign-on. For setting up and testing the connection, it can be convenient to temporarily select Use SAML button on "Sign in" screen and then only switch to Redirect all users to IdP once you have confirmed that single sign-in is working correctly.
- Select Save.
Verifying that single sign-on is set up correctly
Adding a test user to the Igloo application in Okta
- In Okta, go to the Igloo application that you created.
- Select the Assignments tab.
- Select Assign, followed by Assign to People.
- In the search box on the assign popup, enter the user's name.
- Next to the user that you want to add, select Assign.
- When prompted to enter a User Name, leave it unchanged and select Save and Go Back.
- Select Done.
Adding the same test user as a member of your digital workplace
- Go to your digital workplace and sign in.
- Select Control Panel.
- Under Membership, select Manage Members.
- Select Add Members.
- Add the user as follows:
- First Name: Enter the first name of the user.
- Last Name: Enter the last name of the user.
- Email: Enter the user's email. This email address should match the user's username value in Okta.
- Password: Enter a password for the user. This password is for Igloo Authentication. You are required to enter a value in this field even if you only intend to sign in.
- Confirm Password: Re-enter the user's Igloo Authentication password.
- System Groups: Do not select any other groups to add the user to.
- Regular Groups: Do not select any other groups to add the user to.
- Select Create Member.
Using the test user to sign in to your workplace with Okta
In a private browser window, go to your digital workplace. Depending on how you have configured SAML, you will either be redirected to your IdP or arrive at the Igloo Authentication page. For the latter case, in the upper right corner of the Sign-in box, select Use: {your connection's name} to go to your IdP.
While on your IdP's sign-in page, enter the credentials of your test user. If everything is configured correctly, you will be redirected back to your digital workplace and be signed in.
Troubleshooting issues
Incorrect IdP Login URL
If you see an Okta 404 Page Not Found" message after being redirected to your IdP, you may have entered an incorrect IdP Login URL on your digital workplace's SAML Configuration page. Confirm that the value you entered in this field matches the IdP Login URL in the Okta application you configured. You can find this value in Okta by selecting View Setup Instructions on the Sign On tab of the application.
Incorrect Login URL
If after signing in, you are brought back to your digital workplace's domain with an Igloo support code showing, you may have entered the incorrect Login URL for your digital workplace in Okta. Verify that this value is your digital workplace's domain with /saml.digest appended to it. You can configure these values in Okta on the General tab of the application.
Public certificate issues
The following are issues that can occur with the public certificate:
- Invalid format: On your digital workplace's SAML Configuration page, if you click Save and the page refreshes without your changes being saved, the Public Certificate may have an invalid format.
- Expired or Mismatched: If after signing in, you are brought back to your digital workplace's sign in page with the message "An error has occurred. Please try again and, if that fails, contact support" the public certificate in Igloo does not match what Okta is expecting.
To resolve these issues, verify that the public certificate in your digital workplace matches that of your Okta application. You can find the current Public Certificate in Okta by selecting View Setup Instructions on the Sign On tab of the application.
Workplace membership
Not being a member of a digital workplace can result in the following:
- If you successfully sign in to your IdP but get redirected to a page in your digital workplace that says "You do not have sufficient access to this area" and you don't have any navigation options, it's possible that the account you signed in with is not a member of the digital workplace but has been before.
- If you successfully sign in to your IdP but get redirected to a page in your digital workplace that says "The user account was not found. Please contact an administrator", it's possible that you signed in with an account that is not or has even been a member the digital workplace.
In both cases, verify that the email associated with the account you are trying to sign in with is associated with an account in the workplace's member directory.
Not assigned to the application in Okta
If after entering your Okta credentials, you are redirected to an Okta page with the error "Sorry, you can't access { your application name} because you are not assigned this app in Okta", the account must be added to the application in Okta. You can configure who is assigned to the application in Okta on the Assignments tab of the application.