Configuring Okta SSO
StatusGator supports enterprise Single Sign On (SSO) using the Security Assertion Markup Language (SSO). SAML is an open standard for exchanging authentication and authorization data between parties. SAML requires an identity provider (in this case, Okta) and a service provider, in this case StatusGator.
StatusGator SAML SSO has the following benefits:
• Users have have a single identity managed by your SAML Identity Provider.
• One click access to StatusGator from your Identity Provider dashboard.
Setup
As an admin in your Okta account, create a new application. This can be done by clicking the Applications area in their main navigation.
1. Click the Create App integration button.
2. Click the SAML 2.0 radio button.
3. Name your application (f.e StatusGator SSO), and optionally add app logo and hit Next.
You can use this logo:
4. On the SAML settings page, configure these values:
Single sign on URL: https://statusgator.com/users/saml/auth
Note: Make sure Use this for Recipient URL and Destination URL is checked.
Audience URI (SP Entity ID): https://statusgator.com
Name ID format: EmailAddress
Application username: Email
Update application username on: Create and update
5. Scroll down and configure Attribute Statements which map values to user attributes in StatusGator. You'll want to enter first_name, last_name and email as the attribute name on the left, and then choose the corresponding user values on the right. Here's a full screenshot of what the settings should look like:
6. Ensure email is set. StatusGator SAML SSO does not use the standard NameID in the SSO negotiation. Email is required for StatusGator SSO to function.
8. Double check to ensure the Attribute Statements as well as Single sign on URL and Audience URI are set. Then click Next.
7. On the next page click Finish
8. This completes the setup of your ad-hoc StatusGator application in Okta. Next you will retrieve the settings needed to configure StatusGator to use Okta. Open metadata details needed to configure StatusGator for your new Okta application. Keep this browser window open. This information will be used next when configuring StatusGator.
9. Now, go back to StatusGator account, open Team members page, click on the Authentication tab and enable SSO option. Now use the data from the Okta account to fill out the form below.
- Identity Provider Entity ID – Issuer in Okta
- Sign On URL – Sign on URL in Okta
- Sign Out URL – Sign out URL in Okta
- IDP Certificate – Download the Signing Cerfificate encoded certificate. To extract the code, you can drag the file into your browser tab and then copy the code.
The fingerprint and algorithm fields can be left blank.
Once setup, you'll need to associate users in your Okta Directory with StatusGator so they may log in.