Okta SSO via SAML
Setting up Okta via SAML
Set up SSO for OKta using SAML. For a general overview on SAML, see Setting up SAML2 Federated SSO.
NOTE
If you do not see SAML in the SSO list, please create a support ticket to enable SAML for your account.
Setting up SAML SSO for Okta includes:
- Configuring SSO settings for Okta via SAML in Codefresh
- Configuring SSO settings for Codefresh in Okta
- Completing SSO configuration for Okta in Codefresh
Step 1: Configure SSO settings for Okta via SAML in Codefresh
Create a SAML account for Okta in Codefresh to create an integration for Codefresh in Okta.
SAML SSO settings for Okta include auto-syncing teams and groups in OKta with Codefresh, and automatically activating new users synced to Codefresh.
TIP
Use the auto-sync and activate user options for Just in Time (JIT) Provisioning.
- In the Codefresh UI, from the toolbar click the Settings icon.
- In the sidebar, from Access & Collaboration, select Single Sign-On.
- Click Add single-sign-on, select SAML, and then click Next.
- Enter the connection details:
- Display Name: Any name you want for the integration.
- IDP Entry: Type in any character. You will enter the correct value from Okta in the final step.
- Application Certificate: You will enter the correct value from Okta in the final step.
- Provider: Select Okta.
- Auto-sync users and teams to Codefresh: Optional. When selected, automatically syncs teams or groups in Okta to Codefresh, every 12 hours by default. You can define a different sync interval in Sync interval.
NOTE
Though you can assign an Okta application to both groups and individual users, Codefresh only syncs users who are part of teams.
New users in Okta, not assigned to a team, are NOT synced with Codefresh. You should first assign the user to a team for the sync to work. - Activate user after sync: Optional. When selected, Codefresh automatically invites and activates new users added during the automated sync, without waiting for the users to accept the invitations.
- Access Token: Optional. The OKTA API token that you generated in Okta, used to sync groups and their users from OKTA to Codefresh.
- Client Host: The OKTA organization URL, for example,
https://<company>.okta.com
. - Application ID: The Codefresh application ID in your OKTA organization, that will be used to sync groups and user from OKTA to Codefresh.
- Click Add. The SAML integration for Okta is added and appears in the list of SSOs.
- In the Single Sign-On page, click the Edit icon for the Okta SAML integration you created.
- Copy the Assertion URL (client ID) that was automatically generated when you added the integration.
- Continue with Step 2: Configure SSO settings for Codefresh in Okta.
Step 2: Configure SSO settings for Codefresh in Okta
- Navigate to Applications.
- Select Create App Integration > SAML2.0, and click Next.
- General Settings:
- Fill in the Name and any other settings you need.
- Click Next.
- Configure SAML:
- Single Sign On URL:
- ACS URL: Enter the Assertion URL (Callback URL) generated in Codefresh.
- Audience URL:
g.codefresh.io
- Name ID Format:
EmailAddress
- Attribute Statements
- Leave Name Format as Unspecified
- firstName:
user.firstName
- lastName:
user.lastName
- email:
user.email
- Click Next.
- Feedback:
- If displayed, complete the form.
- Click Finish.
- Sign On Tab:
- Select View SAML Setup Instructions on the right.
- Keep the page open as you will need it to complete the setup for Okta in Codefresh.
- Continue with Step 3: Configure SSO settings for Codefresh in Okta.
Step 3: Complete SSO configuration for Okta in Codefresh
Complete SSO setup for Okta via SAML in Codefresh.
- IDP Entry: The IDP URL from the SSO tab in Okta.
- Application Certificate: Copy and paste the content between
-----BEGIN CERTIFICATE-----
and-----END CERTIFICATE-----
from the certificate you downloaded into the field. You can also include the BEGIN and END lines.NOTE
You will get a warning when editing the Certificate section. - Click Save.
You have completed SSO integration for OKta via SAML in Codefresh.
Test SSO connection
Now test the SSO with a test user in a different browser or private/incognito browser to make sure the integration works as it should.
- In the Codefresh UI, on the toolbar, click the Settings icon and then select Account Settings.
- From the sidebar, below Access & Collaboration, select Users & Teams.
- Locate a test user, and from the SSO list, select the integration name to enable SSO for that user.
- In a different browser or private/incognito browser window use the Corporate option to log in.
Related articles
Federated Single Sign-On (SSO) overview
Setting up SAML2 Federated SSO
Common configuration for SSO providers