You are viewing an old version of this page. View the current version.

Compare with Current View Page History

Version 1 Next »

Introduction

Here is a tutorial for setting SAML as SP (Service Provider) and Okta as a Identity Provider (IDP). Below would be the flow how it would be if you have successfully implemented it.
With clicking the login, you would be redirected to the next image in Figure 1.

Figure 1: Login screen

Figure 2: Login page using Okta IDP

Upon successfully login in with your register email you would be redirected to your Joget DX.

Setting up

First thing first wee need to create a new App intergration with SAML 2.0.


Figure 3: App Integration

After selecting SAML 2.0, we have to give an app name and click on "Do not display application icon to users"

Figure 4: General Settings section

To fill up the section in figure 5, to ease out the process. We have to upload the sp-saml-directory manager jar file onto our Joget DX 8 first.

Figure 4: SAML Settings section


Upon uploading go into System Settings and Directory Manager Settings and select the SAML Service Provider Directory Manager like in Figure 5. Upon selecting, it will lead you to the image as Figure 6.

Figure 5: Select Plugin

Figure 6: Plugin Configuration

As you can see you the plugin has shown you your Entity ID and ACS URL so that you could use. Copy the value and past it under Single sign-on URL, Audience URI, and Default RelayState. Change Name ID format onto EmailAddress.
Upon completing that section it would look as below image in figure 7.

Figure 7: SAML Setting (General)


Scroll a bit below and you would stumble upon Attribute Statements(optional). Just fill up the text boxes as below and we are good to go.
Below value is needed so that to identify the users that will be logging into our system.


Figure 8: Attribute Statements


Upon filling up everything under general for the necessary stuff. You could preview the SAML Assertion. If you are happy we could go to the next page.

Figure 9: SAML Assertion


Upon clicking next just Click on I'm an Okta customer adding an internal app, and This is an internal app that we have created.


That is all for the Okta configuration. At least we have setup Okta IDP. But we are not quite there yet. Upon finishing, we need to copy two more information.
Which is, the certificate and the metadata. Below is where you could locate it.


 

Figure 10: Metadata URL and Value


Figure 11: Download Certificate


Upon getting the value, and the certificate. You could insert those value in Figure 6. Only copy the highlighted data in Figure 10. 
One last step that we need to do is assign user in Okta like in figure 12. Upon creating the user you need to assign the newly registered account to the
newly created App and we are good to go.



Figure 12: Add Person

Figure 13: Assign to People

 
Figure 14: Assign people

  • No labels