Posture Control (DSPM)
Configuring Okta as an IdP
This article provides information on how to configure Okta as an identity provider (IdP) for single sign-on (SSO).
Prerequisites
Ensure you have an Okta account with admin privileges.
Configuring Okta
To configure Okta as an IdP for SSO:
- 1. Download the XML metadata from the DSPM Admin Portal.
- Go to Administration > Single Sign On.
- Click Add IdP Configuration.
Click Download XML Metadata.
The XML Metadata contains the following information which you need to provide while configuring Okta:
- Name Identifier Format: DSPM only supports email address as the Name ID format.
- Entity ID: A unique identifier for a SAML entity.
- Assertion Consumer Service (ACS) URL: DSPM destination URL where the SAML response must be sent to by the IdP.
- 2. Configure Okta for SSO.
- Log in to the Okta portal as an administrator.
- Go to Applications > Applications.
Click Create App Integration.
In the Create a new app integration window, select SAML 2.0, and click Next.
In the General Settings tab, enter your App Name, and click Next.
- For Single sign-on URL, enter the AssertionConsumerService location URL provided in the XML Metadata that you downloaded from the DSPM Admin Portal.
- Select the Use this for Recipient URL and Destination URL checkbox.
- For Audience URI (SP Entity ID), enter the entityID provided in the XML Metadata that you downloaded from the DSPM Admin Portal.
- From the Name ID format drop-down menu, select EmailAddress from the drop-down menu.
- Click Next.
- Select I'm an Okta customer adding an internal app, then click Finish.
On the Sign On tab, under SAML 2.0, click More details. Copy and save the Sign on URL and Issuer because you need them when adding identity providers.
Under Signing Certificate, click Download to download the IdP certificate.
- 3. Add Okta IdP in the DSPM Admin Portal.
Add Okta IdP configuration for the tenant.
You can add only a single IdP configuration for one tenant.
Close - 4. Assign users or groups via Okta.
- Log in to the Okta portal as an administrator.
- Go to Applications > Applications.
- Select the application that you created when configuring Okta for SSO.
- Click Assignments.
Select Assign > Assign to People or Assign to Groups depending on whether you want to assign access to a single user or a group of users.
In the window that appears, click Assign for the user or group you want to select, then click Done.
- Repeat the previous step for all users and groups you want to assign to DSPM.
- 5. Configure group attributes in Okta.
- Log in to the Okta portal as an administrator.
- Go to Applications > Applications.
- Select the application that you created when configuring Okta for SSO.
- Select General and scroll down to the SAML Settings section, and click Edit.
- On the General Settings page, click Next.
On the Configure SAML page, under Group Attribute Statements (optional):
- Name: Enter
http://schemas.xmlsoap.org/claims/Group
. - Name Format: Select URI Reference from the drop-down menu.
- Filter: You can select the required value (Starts with, Equals, Contains, and Matches Regex) from the drop-down menu. This value is used to match against the Okta group name values and added to the SAML assertion.
- Name: Enter
- Click Next, and then click Finish.