Okta

Using SAML

Create Okta application

  1. Access https://www.okta.com/login/ to log in.
  2. In sidebar of dashboard, hit "Applications" to drop sub items down, then select "Applications".
  3. Hit "Create App Integration".
  1. In "Sign-in method", choose "SAML 2.0" and hit "Next".
  1. Fill "App name", MDCore-SAML for example and hit "Next".

Create SAML directory on MetaDefender Core

  1. Login to MetaDefender Core management console.
  2. Under "Dashboard", hit "User Management" in sidebar.
  3. Under "User Management", choose "Directories" tab and hit "Add directory" on the top right
  1. In "Add Directory" page, choose "SAML" in Directory Type.
  2. Fill "Name" of the new directory, MDCore-SAML for example.
  3. Under "Service Provider", fill in "Host or IP" where MetaDefender Core is being hosted, https://localhost:8008 for this example.

Configure Okta

  1. Switch to "Applications" screen on Okta home page.
  2. Paste the "Login URL" from MetaDefender Core into "Single sign on URL" and set id for "Audience URI," metadefender_core_saml for example.
  1. Scroll down, navigate to "Attribute Statements" and set mapping from Okta key name to the one set at "User identified by" on MetaDefender Core, then hit "Next".
  1. Choose your answer at "Feedback" screen and hit "Finish".
  2. On next screen, navigate to "SAML Signing Certificates", choose row that has value of column "Status" is "Active" then hit "Actions" and hit "View IdP metadata".
  1. Copy SAML Metadata link
  1. Switch to "Applications" screen on Okta, navigate to "Assignments" tab, and assign users for the application.

Complete configuration on MetaDefender Core

  1. Switch to MetaDefender Core screen, under "Identity Provider", hit on "Fetch URL".
  2. Paste "SAML Metadata link" from Okta to the box under "Fetch URL" and hit "OK" to ensure MetaDefender Core can set Okta as its IdP.
  1. Under "Service Provider", fill in user identity under "User identified" by with ${first_name}${last_name}_ for example.
  2. Select correct role for the user under "User Role".
  3. Hit "Add" to complete the settings.
  1. On screen "User Management", toggle the new directory, MDCORE-SAML in this example. A dialog box is shown to confirm the action. Once "Enable" is hit, all existing sessions will be expired immediately and Okta will be used to authenticate users going forward.

Test the integration

  1. Browse MetaDefender Core, hit "Login", user is redirected to Okta's login page.
  1. Login by the account registered in Okta.
  2. If everything goes right, MetaDefender Core dashboard is shown with user identity set at the top right corner.
  1. For troubleshooting, browse <mdcore-host>#/public/backuplogin.

Test IdP-initiated login

  1. Login to Okta management page.
  2. Navigate to "Applications" / "Applications" on sidebar.
  3. Select the active SAML application.
  1. In tab Sign On, find and hit "View SAML setup instructions" button.
  1. In new page, copy the URL under "Identity Provider Single Sign-On URL" section.
  1. Paste the copied URL to browser and login.
  1. If everything goes right, MetaDefender Core dashboard is shown with user identity set at the top right corner.
  1. For troubleshooting, browse <mdcore-host>#/public/backuplogin.

Using OpenID Connect

Create Okta application

  1. Access https://www.okta.com/login/ to log in.
  2. In sidebar of dashboard, hit "Applications" to drop sub items down, then select "Applications".
  3. Hit "Create App Integration".
  1. In "Sign-in method", choose "OIDC - OpenID Connect", and in "Application type" choose "Web Application" and hit "Next".
  1. Fill "App name", MDCore-SAML for example and hit "Next".

Create OIDC directory on MetaDefender Core

  1. Login to MetaDefender Core management console.
  2. Under "Dashboard", hit "User Management" in sidebar.
  3. Under "User Management", choose "Directories" tab and hit "Add directory" on the top right
  1. In "Add Directory" page, choose "OIDC" in Directory Type.
  2. Fill "Name" of the new directory, MDCore-OIDC for example.
  3. Under "Service Provider", fill in "Host or IP" where MetaDefender Core is being hosted, https://localhost:8008 for this example.

Configure Okta

  1. Switch to "Applications" screen on Okta home page.
  2. Paste the "Login URL" from MetaDefender Core into "Sign-in redirect URIs" and grant permission for everyone to access our application in "Assignments" then hit "Save".
  1. Copy "Client ID" and "Client Secrects".

Complete configuration on MetaDefender Core

  1. Switch to MetaDefender Core screen, under "Identity Provider", hit on "Fetch URL".
  2. OIDC link will be built by appending /.well-known/openid-configuration to your okta domain url (Referred Okta document). For example dev-115662.okta.com/.well-known/openid-configuration
  3. Paste OIDC configuration link above to the box under "Fetch URL" and hit "OK" to ensure MetaDefender Core can set Okta as its IdP.
  1. Under section Service Provider, paste the value of "Client ID" and "Client secrets" that you copied from Okta respectively.
  1. Under "Service Provider", fill in user identity under "User identified" by with ${first_name}${last_name}_ for example.
  2. Select correct role for the user under "User Role".
  3. Hit "Add" to complete the settings.
  1. On screen "User Management", toggle the new directory, MDCORE-OIDC in this example. A dialog box is shown to confirm the action. Once "Enable" is hit, all existing sessions will be expired immediately and Okta will be used to authenticate users going forward.

Test the integration

  1. Browse MetaDefender Core, hit "Login", user is redirected to Okta's login page.
  1. Login by the account registered in Okta.
  2. If everything goes right, MetaDefender Core dashboard is shown with user identity set at the top right corner.
  1. For troubleshooting, browse <mdcore-host>#/public/backuplogin.
Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard