This article applies to MetaDefender Sandbox version 2.2.0 or later releases deployed on Linux systems.
Overview
This article provides step-by-step instructions for configuring SAML 2.0 authentication between MetaDefender Sandbox and Okta. This integration enables single sign-on (SSO) capabilities for your MetaDefender Sandbox users.
Prerequisites
- MetaDefender Sandbox version 2.2.0 or later (SAML 2.0 support is not available in earlier versions)
- Administrative access to MetaDefender Sandbox
- Administrative access to your Okta tenant
- Valid SSL certificates for secure communication
Steps to Configure
Step 1: Configure MetaDefender Sandbox for SAML 2.0
- Access your MetaDefender Sandbox administration panel.
- Navigate to
Settings→Authentication→External - Press
Add servicebutton, then selectSAML 2.0 - In the Service Key field, enter
okta. - Note the redirect URL that is generated - you will need this for Okta configuration.
Step 2: Obtain Required Information from Okta
The following SAML parameters must be obtained from your Okta administration portal:
- Entity ID: Available in your Okta SAML application settings.
- Sign-on URL: The SAML SSO URL provided by Okta.
- Certificate: The X.509 certificate from your Okta SAML application.
To find these in Okta:
- Log into your Okta admin console.
- Navigate to Applications → Applications.
- Select your SAML application (or create a new one).
- Go to the Sign On tab.
- Locate the SAML Signing Certificates section.
- Copy the Identity Provider metadata values.
Step 3: Complete MetaDefender Sandbox Configuration
- Return to your MetaDefender Sandbox SAML configuration.
- Enter the Entity ID from Okta.
- Enter the Sign-on URL from Okta (this is the SSO URL, not the redirect URL).
- Paste the certificate from Okta.
- Save the configuration.
Step 4: Configure Okta Application
- In your Okta SAML application settings.
- Set the Single sign on URL to the redirect URL generated by MetaDefender Sandbox.
- Configure appropriate user assignments and attribute mappings.
- Test the application assignment.
Verify the Change
- Save all configurations in both systems.
- Test the SAML connection using Okta's application testing feature.
- Attempt to log into MetaDefender Sandbox using SAML authentication.
- Verify that user attributes are properly mapped.
- Check MetaDefender Sandbox logs for any authentication errors.
Troubleshooting
Issue: SAML 2.0 option not available
Resolution: Verify you are using MetaDefender Sandbox version 2.2.0 or later.
Issue: Cannot find sign-on URL in Sandbox
Resolution: The sign-on URL comes from Okta, not from MetaDefender Sandbox. Check your Okta SAML application metadata.
Issue: Authentication fails after configuration
Resolution:
- Verify certificate validity and format.
- Check that URLs are correctly configured in both systems.
- Ensure user assignments are properly configured in Okta.
- Review attribute mappings between Okta and MetaDefender Sandbox.
Issue: Missing redirect URL
Resolution: Ensure you have entered "okta" in the service key field to generate the redirect URL.
If Further Assistance is required, please proceed to log a support case or chat with our support engineer.
