Skip to content

Latest commit

 

History

History
38 lines (25 loc) · 3.68 KB

File metadata and controls

38 lines (25 loc) · 3.68 KB

Okta SAML Application setup

This example shows setting up an Okta SAML application and connecting this to Snyk to facilitate SSO. To configure your Okta to use SSO with Snyk, you need an entity ID and a reply URL (Assertion Consumer Service URL) from Snyk.

  1. From the drop-down at the top left select GROUP OVERVIEW and then the cog wheel (top right corner) to get to your group settings.

    Select group overview

    Select group overview

  2. Click on SSO and copy the values under Entity ID and ACS URL or leave the browser tab open for easy access.

    Group Settings: SSO

    Group Settings: SSO

  3. Navigate to Okta, open the application menu, and click on Create App Integration.

    Okta Applications main page

    Okta Applications main page

  4. Choose SAML 2.0 and name your application appropriately; click Next.

    Okta SAML application creation

    Okta SAML application creation

  5. Add the Entity ID and the sign on URL you copied from Snyk to the appropriate fields.

    Add SSO details in Okta

    Add SSO details in Okta

  6. Scroll down to Attribute Statements and add three attributes named with values as follows:

    • Name: email, Value: user.email

    • Name: name, Value: user.firstName + ' ' + user.lastName

    • Name: username, Value: user.login

      Add Okta attribute statements

      Add Okta attribute statements

    Now click Next and enter feedback details if desired or go to the next step.

  7. Open your Okta application list again and click on your newly created application and the Sign on tab. To the right of the page, click on View SAML setup instructions then from the page that opens, copy the Identity Provider Single Sign-On URL and the X.509 certificate.

  8. Go back to the previous page and go to the Assignments tab. Click on Assign and choose users, groups, or both according to your needs.

    Assign the SSO application

    Assign the SSO application

  9. Go back to the Snyk portal, scroll to step 2, and enter the details from step 7, including the domain(s) you wish to use over the SSO connection, verify if an IdP-initiated workflow should be enabled, and then click Create Auth0 connection.

    Snyk SSO step 2

    Snyk SSO step 2

  10. Scroll to step 3 and determine how new users should be treated when signing in. Choose the option you would like to use: Group member, Org collaborator or Org admin. Finally, enter the profile attributes as you configured them in Okta, click Save changes and verify you can log in, either with the direct URL at the top of step 3 or by going to the generic SSO login.

    Profile attributes

    Profile attributes