Platform Secure Firewall Threat Defense Virtual
Activity Manage

Integrating Okta with Security Cloud Sign On

This guide explains how to integrate an Okta SAML application in Security Cloud Control.

Before you begin

Before you begin, read the Integrating Identity Providers to understand the overall process. These instructions supplement that guide with details specific to Okta SAML integrations, specifically Step 2: Provide Security Cloud SAML metadata to your identity provider and Step 3: Provide SAML metadata from your IdP to Security Cloud.

Procedure

1

Sign in to Security Cloud Control with the organization that you want to integrate with Okta.

  1. Create a new identity provider and decide whether to opt out of Duo MFA, as explained in Step 1: Initial setup.

  2. On Step 2: Provide Security Cloud SAML metadata to your identity provider, download the Public certificate, and copy the values for Entity ID and Single Sign-On Service URL for use in the next steps.

2

In a new browser tab, sign in to your Okta organization as an administrator. Keep the Security Cloud Control tab open as you'll return to it shortly.

  1. From the Applications menu, choose Applications.

  2. Click Create App Integration.

  3. Select SAML 2.0 and click Next.

  4. In the General Settings tab, enter a name for your integration (Security Cloud Sign On, for example) and optionally upload a logo.

  5. Click Next to go to the Configure SAML page.

  6. In the Single sign-on URL field, enter the Single Sign-On Service URL provided by Security Cloud Control.

  7. In the Audience URI field, enter the Entity ID provided by Security Cloud Control.

  8. For Name ID format, select either Unspecified or EmailAddress.

  9. For Application username, select Okta username.

  10. In the Attribute Statements (optional) section, add the following mappings of names in SAML attributes to Okta user profile values:

    Name (in SAML assertion)

    Value (in Okta profile)

    email

    user.email

    firstName

    user.firstName

    lastName

    user.lastName

  11. Click Show Advanced Settings.

  12. Click Next.

  13. For Signature Certificate, click Browse files... and upload the public signing certificate that you previously downloaded from Security Cloud Control.


     

    The response and assertion must be signed with the RSA-SHA256 algorithm.

  14. Under Sign On > Settings > Sign on method, click Show details.

  15. Click Next and provide feedback to Okta, then click Finish.

  16. Copy the values of Sign on URL and Issuer and download the Signing Certificate to provide to Security Cloud Control next.

3

Return to Security Cloud Control and click Next. You should be on Step 3: Provide SAML metadata from your IdP to Security Cloud.

  1. Select the Manual Configuration option.

  2. In the Single Sign-on Service URL (Assertion Consumer Service URL) field, enter the Sign on URL value provided by Okta.

  3. In the Entity ID (Audience URI) field, enter the Issuer value provided by Okta

  4. Upload the Signing Certificate provided by Okta.

What to do next

Next, follow the instructions in Step 4: Test your SAML integration and Step 5: Activate the integration to test and activate your integration.