PurposeUse Okta as an Identity Provider (idP) for authentication to SupportLogic. |
Summary |
Okta Integration using SAML 2.0
Okta Integration Steps
Overview
SupportLogic can use Okta as an Identity Provider (idP) for user authentication. This ensures that SupportLogic adheres to the same authentication methods already in place at your own organization.
Below are instructions on how to configure an Okta Identity Provider with the SupportLogic UI. This requires action items from both your Okta Admin and SupportLogic DevOps.
Once Single Sign On (SSO) is enabled in SupportLogic, Okta can be used to grant access to SupportLogic.
SupportLogic only supports Okta tiles when using SAML integration. If you wish to use Okta tiles should inform their Solution Architect to have this functionality enabled
See the following article for details:
Configure SAML application
SupportLogic will provide an entity id and an ACS URL after the completion of internal configuration. Provide this information to your Okta administrator and request that they create a SAML application in your identity provider
Assertion Consumer Service (ACS): the service provider's endpoint (URL) that is responsible for receiving and parsing a SAML assertion. Keep in mind that some service providers use a different term for the ACS. In the Okta SAML template, this is entered in the Single Sign On URL field.
Provide prerequisite information to SupportLogic
Please supply the following information to SupportLogic from your Okta administrator;
IdP Issuer URI: (ex: http://www.okta.com/------------)
The issuer URI of the Identity Provider. This value is usually the SAML Metadata entityID of the Identity Provider EntityDescriptor.
idP single sign on URL (ex: https://companydomain.com/—/—/sso/)
The binding specific Identity Provider Authentication Request Protocol endpoint that receives SAML AuthN Request messages from Okta.
idP signature certificate in PEM format
The PEM or DER encoded public key certificate of the Identity Provider used to verify SAML messages and assertion signatures.
SupportLogic’s Devops team will complete configuration changes in your environment and provide additional information for follow up.
Configure SAML application
SupportLogic will provide an entity id and an ACS URL after the completion of internal configuration. Provide this information to your Okta administrator and request that they create a SAML application in your identity provider
Configure Custom Attributes
Your Okta administrator will need to configure custom attributes for the Okta SAML Application created for SupportLogic. These attributes will be passed by Okta to SupportLogic to provide the full name, email, and picture (if available), for each user, within SupportLogic.
Complete the following steps:
Log into Okta as an Administrator
Locate the existing SupportLogic Application that you created.
Click on “gear” to edit the settings.
Under “General” tab, go to SAML Settings
To the right of “SAML Settings”, click on “Edit”
From the “Edit SAML Integration” screen, click next to go to “Configure SAML”
Towards the bottom, we will configure the “Attribute Statements (Optional)” section.
Please configure the following
Select the Value from the drop down for email, picture, firstname, lastname
Save Changes.
Test SSO login for SupportLogic
Post Setup Configurations
Authorizing users for access to SupportLogic
Users requiring access to SupportLogic will need to be authorized for SSO in Okta by an Okta administrator. Until this is done, the user will not be able to sign into SupportLogic successfully
Provision access to product features in SupportLogic
When a user is granted access to the SupportLogic App, they will be granted Swarming user level access, and a SupportLogic Admin (with Dashboard user access) will need to enable other user functions and assign the user to the right profile..
See “SupportLogic License Types and Different Login Options” to learn more about how to configure different access levels.
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article