Configure SSO with OKTA
    • 03 Oct 2024
    • 2 Minutes to read
    • Dark
      Light
    • PDF

    Configure SSO with OKTA

    • Dark
      Light
    • PDF

    Article summary

    ZPE Cloud offers a user-friendly solution for integrating Okta as a Single Sign-On Identity Provider. This seamless integration enables users to access ZPE Cloud effortlessly while enforcing all security policies established in Okta, including Multi-Factor Authentication (MFA).

    In this article, you'll learn how to:

    Configure the ZPE Cloud App in Okta

    1. Log in to the Okta Administrator Panel.

    2. Navigate to Applications.

    3. Click Create App Integration and select SAML 2.0.


    4. Provide a Name for the application, the recommended names are ZPE Cloud or ZPE Cloud EU and click Next.


    5. Add a Single sign-on URL and Entity ID.


      Note: 

      The Single sign-on URL is a temporary placeholder. Once we generate the Metadata XML file, we'll retrieve the correct value from the ZPECloud.


    6. (Optional) If you wish to have all the personal user information sent from Okta, add Attribute Statements.

      1. Name : firstName , Value: user.firstName

      2. Name : lastName , Value: user.lastName

      3. Name: phone, Value: user.mobilePhone

      4. Name : memberOf , Value: “Administrator“

      5. Name : timeout, Value: 600

        Note:

        The memberOf value must correspond to an existing Group name in ZPE Cloud. The Administrator group and the User group serve as the default groups. If a user cannot be matched to a ZPE Cloud group, they will be placed into the Default group, which is the User group.

    7. Click Save.

    8. Assign the users that will have access to ZPE Cloud.


    9. Download the Federation Metadata XML in the Sign-on Tab.

      1. Copy the Metadata URL and save it.

    Configure Okta SSO on ZPE Cloud

    1.  Log in to the ZPE Cloud account as an Administrator.

    2. (Optional) SSO providers require a signed Logout request. For this, a certificate needs to be created. This can be a self-sign certificate or can be a signed certificate.

    3. To create a Certificate:

      1. Navigate to Settings > SSO >Certificate and provide the following values:

        1. Country Code: 2-letter country code for your company location.

        2. State: state for your company location.

        3. Location: location for your company location.

        4. Organization:  the name of the company.

        5. Organization Unit: any additional OU.

        6. Common Name: recommended value: zpecloud.com or zpecloud.eu Email Address: email address of the Administrator.

        7.  Subject Alternative Name: same as Common Name, recommended value: zpecloud.com or zpecloud.eu.

        8. For a Self-Signed Certificate, enable Self-Sign Certificate. Provide a value for Certificate Validity (days). 

           

        9. To create the SSO, navigate to Settings > SSO, and click Add.

           
           

        10.  Name: use the same value that was used in the Reply URL on Okta, the recommended value is okta.

        11.  Entity ID: use the same value that was used in the Entity ID on Okta, the recommended value is zpe-cloud or zpe-cloud-eu.

        12. Click LOAD METADATA and select the downloaded MetadataXML file from Okta.

        13. Select Enable Single Logout. 

        14. Click Save.


      2. Copy the ACS URL.

    Configure ZPE Cloud App in Okta - Part 2

    1.  Log in to the Okta Administrator portal, go to your ZPE Cloud Application, and edit the configuration.

      1. Add the ACS URL you copied to the Single sign-on URL.


      2.  Under Advanced Settings, add https://proxy-access.zpecloud.com, which is used to set up the remote access SSO option.

      3. Click Save. The configuration is complete, you should be able to access ZPE Cloud using SSO.

    (Optional) Configure ZPE Cloud SSO for Remote Access to devices

    This section

    1. Log in to your Nodegrid device and navigate to Security :: Authentication :: SSO. 

    2. Click Import Metadata.

    3. Add the Name.

    4. Change the Status to Enabled.

    5. Add the Entity ID, same as Okta.

    6. Select the Metadata file, same as downloaded previously from Okta.

    7. Add the Icon and click Save.





    Was this article helpful?

    ESC

    Eddy AI, facilitating knowledge discovery through conversational intelligence