Okta SAML 2.0 SSO Integration
Setting up Okta for AIR (Available from AIR 4.1)
Last updated
Setting up Okta for AIR (Available from AIR 4.1)
Last updated
Sign in to the Okta Admin Dashboard.
Click the “Applications” button in the left menu.
Click Create App Integration.
Select SAML 2.0 as a sign-in method and click the “Next“ button
Name your application, and upload a logo (logo is optional), and click the “Next” button
Enter your domain name followed by this callback at the end of the path: /api/auth/sso/okta/callback
.
For example: <https://<your-domain-name>>/api/auth/sso/okta/callback
Fill in the Attribute Statements section as follows:
All fields are case-sensitive. Make sure all of them are filled correctly.
On the next page, click the first option, and then click the “Finish” button.
Go to the “Profile Editor” page under the “Directory“ section and click the name of the latest created app.
In the “Attributes” section, click the “Add Attribute” button.
Select “string array“ as the data type.
Enter a name and description for the attribute.
Enter “roleTags“ as the variable name.
Click the “Define enumerated list of values“ checkbox.
Click the “Attribute required“ checkbox.
Give a display name of your new role and enter the corresponding “Tag” of the role that you want to map within the Binalyze AIR Console into the “Value” field. For example, the “global_admin”, which is the tag of the Global Admin role in Binalyze AIR Console, is used for the “Value” section.
Then click save.
Navigate back to the “Applications“ page. Click the name of the app. Then go to the “Assignments” tab.
Click the “Assign to People” button under the “Assign“ dropdown.
Click the “Assign” button that you want to assign to.
Leave the user name field as is and select the roles of the user. And click the “Save and Go Back“ button.
Go to the “Sign On” tab and click “More Details“
Sign in to the Binalyze AIR Console.
Navigate to the “Settings” page, then click the “Security” section.
Enable Okta by clicking the switch button.
Fill in the required fields according to the Sign on tab in the Okta
Entry Point: Okta Sign on Url
Issuer: Okta Issuer
Cert: Okta Signing Certificate
Click Save settings
The “Sign in with OKTA” button should appear on the Binalyze AIR Console login page. Once you click this button, you will navigate to the Okta login page to authenticate your access. Once you are authenticated, you will be redirected back to the AIR console.
After configuring Single Sign-On (SSO), it is mandatory to retain at least one local user account. This is essential because if the SSO URL expires or any configuration changes occur on the SSO provider's side, you will need access to a local account to log into the AIR Console and update the SSO settings.
Maintaining a local user account acts as a safety net, ensuring continued access to critical administrative functions within AIR, even in scenarios where the SSO functionality is temporarily unavailable.