Skip to main content

Okta (IDP) initiated SSO for AE using SAML

The topic describes the setups in Okta and AutomationEdge for IDP initiated SSO with SAML.

Setups in Okta

The section describes the steps for setups in Okta for IDP initiated SSO with SAML.

To proceed with setups in Okta for IDP initiated SSO with SAML:

  1. Sign-in to Okta. The Getting Started page appears.

    Note:

    Change the UI from Developer Console to Classic UI.

  2. Click the Applications tab, and then Applications. The Applications page appears.

    Applications dialog
    Important

    For SAML, you must register an additional ACS URL for PS login: http://localhost:2611/callback.

  3. On the page, click Add Application. The Add Application page appears.

    Create app
  4. Click Create New App. In the Create a New Application Integration dialog, select Web Platform and SAML 2.0.

    Create new application integration
  5. Click Create. In the Create SAML Integration page, enter a name for the application you want to create, for example, MySamlApp.

    Create SAML integration
  6. Click Next and configure the application details.

    1. Specify the Single sign on URL.

      Note:

      The Audience URI is the same as the Single sign on URL.

    2. In the Name ID format field, select Transient and in the Application username field, select Okta username.

      Create SAML integration 1

      Add Application name, Login redirect URI, and the Logout redirect URI.

      Note:

      Login redirect URI and Logout redirect URI should be the same for AE, and it is the base URL for aeui.

    3. Click Show Advanced Settings and enter the following details:

      Advanced details
      • Response: Select Signed as it will sign the response after successful login.

      • Assertion Signature: Select as Signed. The signature algorithm is RSA-SHA256; we use the algorithm to sign the login request in the backend.

      • Digest Algorithm: Select as SHA1.

      • Assertion Encryption: Select as Unencrypted.

      • Enable Single Logout: Select the checkbox to allow the application to initiate single logout as well.

      • Single Logout URL: Enter the logout URL.

      • SP Issuer: Enter the same URL as the Single sign on URL.

      • Signature Certificate: As we are signing the Request Descriptor xml file we need a certificate for it. Browse and upload the certificate. To generate the certificate, see Keystore and Certificate Generation.

        Even the SAML Issuer ID provides the same value as the Single sign on URL.

      Note:

      The following fields have the same values: • Single Sign on URL • Audience URL • SP issuer • SAML issuer ID

  7. Add Attributes / Claims. The following table lists the attributes / claims for Okta IDP for SAML app.

    NameValues (case sensitive)
    firstNameuser.firstName
    lastNameuser.lastName
    emailAddressuser.email
    usernameuser.login
    orgCode{{OrgCode}}
  8. The value expression for the list of claims used in AutomationEdge may change for different Identity Providers (IDP).

Note:

It is mandatory to specify values for username and orgCode. It is preferable to provide values for firstName, lastName and emailAddress Attributes for a complete profile view.

This is the Okta Expression Language syntax to generate values derived from attributes in Universal Directory and app profiles. To validate an expression, use the Token Preview tab.

To add more attributes, click Add Another.

There are no configurations required in the GROUP ATTRIBUTE STATEMENTS.

  1. Scroll down and click Next, and then click Finish. The configuration is complete.

Fetch the Descriptor file and Client ID for AE SSO setup

In the section, you’ll learn to fetch a descriptor file and client ID to be used in the AE SSO setup.

To fetch a descriptor file to be used in the AE SSO setup:

  1. On the Applications page, click MySamlApp. The configurations appear.

    Active application
  2. On the application page, click Sign On tab. The Settings section appears.

    SAML app sign on
  3. Click Identity Provider metadata. The Metadata.xml file opens in a new tab.

    SAML metadata

    Right-click anywhere in the file and click Save As. Save the file as metadata.xml.

    Note:

    Use the file as the Descriptor file when setting up AE SSO.

To fetch the client ID to be used in the AE SSO setup:

  1. Click the General tab. Scroll down to the App Embed Link section and get the Client ID.

    App embed link

    The Client ID is part of the Embed Link and is highlighted.

    SAML app
    Note:

    Copy the Embed Link URL and paste in the browser. The IDP initiated SSO flow is invoked after completion of all the configurations.

  2. On Okta Classic UI, click MyApps tab. MySamlApp appears on the page.

    Note:

    As discussed in the next sections, you may click on the App for Single sign on to AE (redirects to the AEUI Home page) once all the settings are complete.

Assign Okta users to SAML app

In the section, you will learn how to assign Okta users to SAML app.

To assign Okta users to SAML app:

  1. Go back to the Applications tab. The MySamlApp appears.

  2. On My Web App page, click the Assignments tab. The Assign Applications page appears.

  3. On the page, click Assign Apps to People tab. The Application section appears.

  4. Select the following checkboxes:

    i. Under Applications, select the checkbox next to the application, that is, MySamlApp.

    ii. Under People, select the checkbox next to the user. For example, Thomas Astebro.

    iii. Click Next and then search for other users you want to assign to the app to. The user details appear.

    iv. Click Save and then Go Back. The Assign Applications page appears.

    Assign apps

    v. Click the Confirm Assignments tab. Review the assignment and click Confirm Assignments. The assigned user details appear. And the Okta setups for IDP initiated SSO with SAML app is complete.

    Assign apps1

    The assigned user details appear. And the Okta setups for IDP initiated SSO with SAML app is complete.

Setup on AE Tomcat server for SAML apps

In the section, you will learn how to setup on AE Tomcat Server for SAML apps.

To setup on AE Tomcat server:

  1. Stop Tomcat server and then go to: /webapps\aeui\WEB-INF folder. For example, D:\AutomationEdge\tools\apache-tomcat-9.0.36\webapps\aeui\WEB-INF. The Web.xml file is available.

  2. Edit the xml file. Comment <http-method>POST</http-method>, which comes after

    Code
  3. Restart the Tomcat server. The setups on the AE Tomcat server for SAML apps is complete.

Setups on AE UI for Single Sign-On using SAML

In the section, you will learn the AutomationEdge setups.

To setup on AE UI for Single Sign-On using SAML:

  1. Configure Single Sign-On in AutomationEdge.

    SSO Okta
    Note:

    For SAML app, the Import option is not used to fetch Metadata URI.

  2. Create an SSO user in AutomationEdge, mapping it to an IDP user with permissions on the IDP application.

    Edit user

Invoke IDP (Okta) initiated SSO using SAML

In the section, you will learn how to invoke IDP (Okta) initiated SSO using SAML.

To invoke IDP (Okta) initiated SSO using SAML:

  1. In the Applications General tab and then go to App Embed Link URL.

    App embed link
  2. Copy-paste or enter the URL from the Embed Link field in the browser. You are redirected to AutomationEdge with IDP initiated SSO.

    Or

    In Okta Classic UI, click My Apps. You can see your app in the list.

    Get started with Okta

    Click the application. You are redirected to AutomationEdge with IDP initiated SSO.

    Okta IDP app

    When you sign-out of AE, you are also logged out IDP (Okta) due to the Single Logout URL setting. The process of IDP initiated SSO is complete.