Provision console users via Okta

My OPSWAT Central Management offers an integration with a 3rd-party Single Sign-on Service (SSO). This enables an account to provision new users to manage your account. When a user logs into the My OPSWAT Central Management console through your own SSO service, My OPSWAT Central Management will provision that user as a read-only user on your account. You can update the user's role later.

My OPSWAT Central Management uses the secure and widely adopted industry standard Security Assertion Markup Language 2.0 (SAML 2.0), so that you can integrate easily with any large identity provider that supports SAML 2.0.

Prerequisites

The 3rd-party Single Sign-on Service (SSO) feature is available for paid Customers. If you are using a free account and would like to use this feature, please click the "Upgrade Request" button under Console Management > Settings > Global > Account tab.

Supported features

  • IdP-initiated SSO
  • SP-initiated SSO
  • Just-In-Time provisioning

Configuration steps

  1. Log into Okta as an administrator
  2. Navigate to Applications and click on "Browsers App Catalog" button
  3. Search OPSWAT and select My OPSWAT Central Management application
  1. Click the Add Integration button
  1. Enter the Application Label, for example My OPSWAT Central Management and click the Done button
  1. Navigate to Sign On tab.
  2. Open the Metadata URL on another tab and save the content as idpmetadata.xml
  1. Login My OPSWAT Central Management Console
  2. Navigate to User Management > SSO > Console Authentication
  3. Check Enable Single Sign On
  4. Upload idpmetadata.xml from step 7 and click the SAVE button
  1. Scroll down to the My OPSWAT Central Management Login URL and copy the URL
  1. Switch to Okta Admin
  2. Click the Edit button
  3. Scroll down to the Advanced Sign-on Settings and paste the My OPSWAT Central Management Login URL
  1. Click the Save button
  2. DONE. Now you need to assign people/groups who can access this application on Okta.

If You couldn't import the identity provider information from the IdP metadata file, you can get information from the Set up instruction page of the app and copy IdP certificate, Issuer, and IdP SSO URL to the My OPSWAT Central Management console

IDP Mappings

IdP Mapping allows you to synchronize user groups from your external Identity Provider (IdP) to specific roles within My OPSWAT Central Management . This ensures users are automatically assigned the correct permissions upon their SSO login.

To enable group syncing, Okta must be configured to include group memberships in the SAML assertion.

Step A: Attribute & Group Statements

  1. Navigate to your My OPSWAT Central Management Application in Okta > General > SAML Settings > Edit.

  2. In Attribute Statements, ensure these core fields are mapped:

    • Name: firstName | Value: user.firstName
    • Name: lastName | Value: user.lastName
  3. In Group Attribute Statements, add:

    • Name: groups
    • Name format: Basic
    • Filter: Matches regex | Value: .* (This sends all groups the user belongs to).

Step B: OCM Configuration

  1. Go to My OPSWAT Central Management > User Management > SSO.
  2. In the Group Attributes field, enter: groups (This must match the "Name" defined in Okta).
  3. Navigate to User Management > IdP Mappings > Add IdP Mapping.
  4. Name on IdP: Enter the exact Group Name from Okta (e.g., IT_Admins).
  5. Role: Select the corresponding OCM role (e.g., Security-Admin).

SP-initiated SSO

Contact OPSWAT Support to enable SP-initiated SSO for your domain users

Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard