PurposeUse Okta as an Identity Provider (idP) for authentication to SupportLogic. |
Summary
|
Okta Integration using SAML 2.0
Okta Integration Steps
Overview
SupportLogic can use Okta as an Identity Provider (idP) for user authentication. This ensures that SupportLogic adheres to the same authentication methods already in place at you own organization.
Below are instructions on how to configure an Okta Identity Provider with SupportLogic UI. This requires action items from both your Okta Admin and SupportLogic DevOps.
Please make sure you coordinate this effort with either you Customer Success Manager or Solutions Architect at SupportLogic.
Once Single Sign On (SSO) is enabled in SupportLogic, Okta can be used to grant access to SupportLogic.
SupportLogic only supports Okta tiles when using SAML integration. If you wish to use Okta tiles should inform their Solution Architect to have this functionality enabled
See the following article for details:
Identity Provider Initiated Single Sign-on
Configure SAML application
SupportLogic will provide an entity id and an ACS URL after completion of internal configuration. Provide this information to your Okta administrator and request that they create a SAML application in your identity provider.
Provide prerequisite information to SupportLogic
Please supply the following information to SupportLogic from your Okta administrator:
idP issuer URI
idP single sign on URL
idP signature certificate in PEM format
SupportLogic’s Devops team will complete configuration changes in your environment and provide additional information for follow up.
Configure SAML application
SupportLogic will provide an entity id and an ACS URL after completion of internal configuration. Provide this information to your Okta administrator and request that they create a SAML application in your identity provider.
Configure Custom Attributes
Your Okta administrator will need to configure custom attributes for the Okta SAML Application created for SupportLogic. These attributes will be passed by Okta to SupportLogic to provide the full name, email and picture (if available) for each user within SupportLogic.
Complete the following steps:
Log into Okta as an Administrator.
Locate the existing SupportLogic Application that you created.
Click on the “gear” to edit the settings.
Under “General” tab, go to SAML Settings.
To the right of “SAML Settings”, click on “Edit”.
From the “Edit SAML Integration” screen, click next to go to “Configure SAML”.
Towards the bottom, we will configure the “Attribute Statements (optional)” section.
Please configure the following:
Select the Value from the drop down for email, picture, firstname, lastname
Save Changes.
Test SSO login for SupportLogic.
Post Setup Configurations
Authorizing users for access to SupportLogic
Users requiring access to SupportLogic will need to be authorized for SSO in Okta by an Okta administrator. Until this is done, the user will not be able to sign into SupportLogic successfully
Provision access to product features in SupportLogic
When a user is granted access to SupportLogic App, they will be granted Swarming user level access and a SupportLogic Admin (with Dashboard user access) will need to enable other user functions and assign the user to the right profile.
See the User Permissions Guide article to learn more about how to set access levels for users in SupportLogic.
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article