🌐
Portal Docs
  • ✨Overview
  • 📊Dashboards
    • 📈Traffic Overview
    • 🔍Analysis
    • 🔴Paths Attacked
    • 👁️‍🗨️Known Bots
    • ⚡Response Overview
    • ⚡Challenge Performance
    • ⚡Top Attack Sources
    • 🔬Profiling
    • 🔬Details
    • 🔍POV Report
  • ✏️Management
    • ‼️Quarantine
    • ☑️Trusted List Management
    • 📃Audit Trail
  • 🧮Configuration
    • ⚙️Datastream Configurations
      • 🛠️Integration details
      • 👾Challenge configuration
      • 🔧Threat and Trust Lists
  • 👥User Management
    • Single Sign On (SSO)
      • SAML SSO Setup
      • Okta SSO Setup
      • Entra ID SSO Setup
      • SSO FAQs
    • IP Restriction
  • ❔Glossary of Terms
  • 📗User Guides & Videos
    • Portal Setup & Log Shipping Guide
  • 🧙‍♀️Customer Service Desk
  • 📖Integrations Documentation
  • Release notes
    • Version 1.7
    • Version 1.6
    • Version 1.5
    • Version 1.4
    • Version 1.3
    • Version 1.2
    • Version 1.1
    • Version 1
Powered by GitBook
On this page
  • Configuration
  • Testing
  1. User Management
  2. Single Sign On (SSO)

Okta SSO Setup

PreviousSAML SSO SetupNextEntra ID SSO Setup

Last updated 7 months ago

Netacea will supply you with the following before you start:

  • Single sign-on URL

  • Audience URI (SP Entity ID)

Configuration

  • Go to the Okta application and Sign in

  • Go to the Applications and click on Create App Integration

  • Select SAML 2.0 and click on Next

  • Landed to Create SAML Integration > General Settings Fill the following fields

    • App name : Netacea Portal (PROD)

    • Do not check the App visibility and click on Next

  • SAML Settings

    • Paste the Single sign-on URL

    • Paste the Audience URI (SP Entity ID)

    • Select EmailAddress in the Name ID format field

    • Select Email in the Application username

    • Select Create and update in the Update application username on field

    • Select Signed in the Response field

  • Add Attribute Statements as follows

These data mappings are used to correctly display usernames, send portal notifications to associated email addresses, and are used in Netacea’s Audit Trail feature to identify which actions were taken by who and when. User mappings are created automatically when a user logs into the Netacea Portal via SSO - and can be removed either by request, or through the User Management section of Netacea’s Portal.

  • Leave any other fields and keep them to their default values

  • Click on Next

  • Select the App type checkbox and then click on Finish

  • Select the Sign on Tab and copy the Metadata URL value from App and provide this to the Single Sign On setup form in the Netacea Portal

  • Populate the Attribute Mappings using the Attribute Statements from Okta:

    • Given Name Attribute

      • In the example above, the value is given_name

    • Family Name Attribute

      • In the example above, the value is family_name

    • Email Address Attribute

      • In the example above, the value is email

Testing

It is recommended to configure SSO in a separate incognito mode window of your browser. This way, you keep the session in the standard window, allowing you to switch off the SSO authorization in case something is misconfigured.

  • Visit: https://portal.netacea.com

  • Select Enterprise SSO Login

  • Login using a valid email address associated with the Okta application.

Check out the FAQs for answers to some common issues

👥
Copy the Metadata URL so it can be pasted into the Netacea SSO setup page.
In the Netacea Portal, provide the IDP Configuration settings from the Okta form