Okta

Below you can find a step by step tutorial on how to integrate Okta with MetaDefender Sandbox using the OpenID Connect protocol.

Prepare the MetaDefender Sandbox for the OAuth integration

Let’s prepare the SSO settings in MetaDefender Sandbox as follows:

  1. Go to Admin panel > Settings > Authentication on MetaDefender Sandbox page.
  2. Click on + Add Service button
  3. Fill in the Name (e.g. "Okta") and Service key (should be "okta") values
  4. Do NOT click Save yet, the remaining values will be filled in later
  5. Please note down the Redirect URI at the bottom of the form

Register application in Okta

  1. Sign into Okta and navigate to admin dashboard
  2. Go to Applications and select Create App Integration

Please copy the Client ID and client secrets from the newly created application.

Configure MetaDefender Sandbox for Okta SSO

Let’s finish the configuration of the MetaDefender Sandbox SSO settings using the information collected above:

  1. Go back to the MetaDefender Sandbox UI
  2. Fill the form details for the newly created service using the reference below
  3. Save the form
FieldDescriptionExample
NameIntegration nameOkta
Home pageFirst page after log inhttps://sandbox.mycompany.com
Client IDApplication (client) ID , comes from Okta1234-5678-90123-4567
Client secretComes from Oktaabcd1234!%#
OrderThe order of authentication can be specified1
ActiveEnable or disable the authenticationon
Use stateGenerate and validate OIDC state parameter - must be enabled for Oktaon
Base URLService base urlhttps://mycompany.okta.com
PathService URL postfix. Format should be:/.well-known/openid-configuration
Service KeyIs used internally in our app and in redirect URIokta

Testing the integration

  1. Log out of MetaDefender Sandbox
  2. You will notice that there is a new Sign In with Okta button on the login page
Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard