Configuring Single Sign-On using SAML 2.0 for Okta10 minutes to read
ManageEngine PAM360 integrates seamlessly with Okta to provide robust and secure Single Sign-On (SSO) capabilities. Organizations can centralize user authentication and streamline access management by configuring PAM360 as a Service Provider (SP) and Okta as an Identity Provider (IdP). This integration involves supplying details about SP to IdP and vice-versa. This integration enhances security by leveraging Okta's advanced authentication mechanisms. It simplifies the user experience by allowing users to log in once via Okta and gain access to PAM360 without re-authentication. Additionally, the integration supports Single Logout (SLO), ensuring that when users log out from one application, they are automatically logged out from all connected applications, thereby maintaining secure and efficient user session management. This document covers the following topics in detail:
Follow these steps to seamlessly integrate PAM360 with Okta, enabling a smooth and secure SSO and SLO experience. 1. PrerequisitesTo configure PAM360 as an SP on the Okta dashboard, you need SP details displayed in step 1 during the IdP configuration in PAM360. These details are necessary for setting up PAM360 as an SP on the Okta dashboard, ensuring a seamless integration between PAM360 and Okta. 2. Adding PAM360 as an Application on the Okta DashboardFollow these steps to add PAM360 as an application on the Okta dashboard and configure the SAML settings.
On the Create SAML Integration page, you should complete the following configurations: General Settings and Configure SAML. 2.1 General SettingsOn the Create SAML Integration page, under General Settings, you should provide essential information about the application you are adding. Follow these steps to complete this section:
2.2 Configure SAMLOn the Configure SAML window, under SAML Settings, enter the following details.
Note: Ensure the Authentication Context Class selected during SAML SSO configuration is consistent across the IdP and the SP. Any mismatch in the selected options can result in authentication failures or unpredictable behavior. After configuring the SAML properties, specify the Attribute Statements. The attribute statement is a crucial part of the SAML assertions that provides information about the authenticated user. PAM360 identifies the user by cross-referencing the attribute within the attribute statement with its username before granting access to the user. As the usernames in Okta and PAM360 could be different, you must specify the format. There are two possible scenarios:
Note: The name of the custom NameID attribute created on the Okta console must be entered in the NameID Attribute field under Step 3: Configure SAML Properties while configuring Okta as a trusted IdP in PAM360. After configuring the required parameters, click the Preview the SAML Assertion option to review a sample of the SAML assertion that will be sent by the IdP to PAM360. Then, click Next to proceed to the next step. Complete the feedback questionnaire and click Finish to finalize the SP configuration and SAML parameters on the Okta dashboard. 3. Assigning PAM360 Application to UsersAfter setting up the newly added application integration (PAM360), you must assign it to the users in your Okta directory.
Note: After configuring PAM360 as an SP in Okta, you must configure Okta as an IdP in PAM360 to establish it as a trusted entity. Access the PAM360 browser window and proceed with the IdP configuration starting from Step 2 - Configure Identity Provider Details. Explore this link for the detailed IdP configuration steps. Based on the provided steps, configure Okta as an IdP and define the SAML properties on the PAM360 interface. 4. Downloading Okta IdP Metadata FileFollow these steps to download the IdP details as a metadata.xml file after configuring PAM360 as an SP.
| |