Create Okta application
- Access https://www.okta.com/login/ and sign in.
- In sidebar of dashboard, hit
Applicationsto drop sub items down, then selectApplications. - Click
Create App Integration.

- In
Sign-in method, chooseSAML 2.0and clickNext.

- Fill
App name, MDCore-SAML for example and clickNext.

Create SAML directory in MetaDefender Core
- Sign in to MetaDefender Core management console.
- Under
Dashboard, hitUser Managementin the left sidebar. - Under
User Management, chooseDirectoriestab and clickAdd directoryin the top right.

- In
Add Directorypage, select SAML forDirectory Type. - Fill
Nameof the new directory, MDCore-SAML for example. - Under
Service Provider, fill inHost or IPwhere MetaDefender Core is being hosted, https://localhost:8008 for this example.

Configure Okta
- Switch to
Applicationsscreen in Okta home page. - Paste the
Login URLfrom MetaDefender Core intoSingle sign on URLand set ID forAudience URI, metadefender_core-saml for example.

- Scroll down, navigate to
Attribute Statementsand set mapping from Okta key name to the one set atUser identified byin MetaDefender Core, then hitNext.

- Choose your answer at
Feedbackscreen and clickFinish. - On the next screen, navigate to
SAML Signing Certificates, choose the row that has value of columnStatusis "Active" then dropActionsdown and clickView IdP metadata.

- Copy SAML Metadata link.

- Switch to
Applicationsscreen in Okta, navigate toAssignmentstab, and assign users for the application.

Complete configuration in MetaDefender Core
- Switch to MetaDefender Core screen, under
Identity Provider, click onFetch URL. - Paste "SAML Metadata link" from Okta to the box under
Fetch URLand clickOKto ensure MetaDefender Core can set Okta as its IdP.

- Under
Service Provider, fill in user identity underUser identified bywith ${first_name}_${last_name} for example. - Select the appropriate role for the user under
User Role. - Click
Addto complete the settings.

- In
User Managementscreen, toggle the new directory, MDCORE-SAML in this example. A dialog box is shown to confirm the action. OnceEnableis hit, all existing sessions will be expired immediately and Okta will be used to authenticate users going forward.

Test the integration
- Browse MetaDefender Core, hit
Login, user is redirected to Okta's sign-in page.

- Sign in by the account registered in Okta.
- If everything goes right, MetaDefender Core dashboard is shown with user identity set at the top right corner.

- For troubleshooting, browse
<mdcore-host>#/public/backuplogin.
Test IdP-initiated SSO
- Sign in to Okta management page.
- Navigate to
Applications/Applicationson the sidebar. - Select the active SAML application.

- In
Sign Ontab, find and hitView SAML setup instructionsbutton.


- In the new page, copy the URL under
Identity Provider Single Sign-On URLsection.

- Paste the copied URL to a web browser and sign in.

- If everything goes right, MetaDefender Core dashboard is shown with user identity set at the top right corner.

- For troubleshooting, browse
<mdcore-host>#/public/backuplogin.
