Single Sign-On Setup: Okta

INTRODUCTION

In this topic, you will learn how to set up SSO with your Okta account  by configuring:

  • Okta (the Identity Provider or IdP)
  • CloudCheckr (the Service Provider or SP)

CONFIGURE IN OKTA

This procedure shows you how to perform the following steps in Okta:

  • add new application
  • configuration application
  • configure SAML settings
  • download IdP metadata
  • assign people to the application
  1. In your Administration console, go to Applications tab, and click the Create New App button.
  2. Select the SAML 2.0 option.
  3. Under General Settings, go to the App name text field and type CloudCheckr
  4. Configure the following SAML settings:
    • Single Sign-On URL: *https://app.cloudcheckr.com/sso/acs
    • Use this for Recipient URL and Destination URL: Yes
    • Audience URI (SP Entity ID): https://app.cloudcheckr.com
    • Name ID format: EmailAddress
    • Default username: Email
    • Response: Signed
    • Assertion: Signed
    • Authentication context class: X.509 Certificate
    • Request compression: Compressed

  5. On the Sign-On tab of the new application, click the Identity Provider metadata link to download an XML file that contains the metadata from Okta that CloudCheckr requires to complete the setup.
  6. On the People tab, click the Assign Application button to select the link that users will see when they log onto CloudCheckr.

Note: Email addresses as SSO usernames are required, so if your users do not have email, you must provide an email address.


CONFIGURE IN CLOUDCHECKR

Please email support to ensure your CloudCheckr account is properly configured to allow access via Okta.


See Also:
CloudCheckr Single Sign-On

Leave a Reply