This document provides a step-by-step guide on how to configure SAML for the Securin platform on your Okta application.
Step 1: Creating an Enterprise Application on Okta
Step 2: Setting up the Single Sign-On (SSO)
Step 3: Adding Attributes and Claims
Step 4: Adding Users to the Application
Step 5: Signing in with Single Sign-On in Securin
Prerequisites
The SSO URL and Audience URI (SP Entity ID): These details can be obtained by dropping a note to support@securin.io.
Step 1: Creating an Enterprise Application on Okta
To create an enterprise application, you need to:
- Log in to your Okta application.
- Click on Create App Integration in the Applications tab.
Create App Integration—1
- Then, select SAML 2.0.
Create App Integration—2
- Click Next.
Step 2: Setting up the Single Sign-On
- In the General Settings section, you need to enter Securin Okta as the App Name.
- Optionally, upload an image for the App logo.
- Click Next.
OKTA General Settings—1
- Enter the sign-on URL. It should be in the following format: https://auth.securin.io/auth/realms/CyberSecurityWorks/broker/company-name/endpoint.
- Check the box next to Use this for Recipient URL and Destination URL.
- Add the audience URI. It should be in the following format: https://auth.securin.io/auth/realms/CyberSecurityWorks.
- Select Email as the Application username. This means that the user names will be based on the employees' email address.
OKTA General Settings—2
Step 3: Adding Attributes and Claims
In this step, you need to add the Attribute claims to allow users and their email addresses to access the SSO feature.
- The value for firstName should be user.firstName, and the value for lastName should be user.lastName.
Attributes Configurations—1
Then, select the appropriate options for your configuration.
Attributes Configurations—2
The Okta SSO configurations are now complete.
Metadata URL
Step 4: Adding Users to the Application
Once the application is set up, you can add users who can access the single sign-on feature.
- In the Securin Okta Application page, click Assign Users in the left navigation pane.
Assigning Users—1
- In the search box, type the name of the users you want to give access to and click Assign.
Assigning Users—2
- When you're done assigning SSO for all users, click Done.
Your user setup is also complete now.
Step 5: Signing in with Single Sign-On in Securin
- To sign in with SSO, go to Securin's sign-in page and click on Sign-in with Single Sign On.
Securin Sign-in Screen
- Enter the email address with which you have set up SSO and click Continue.
SSO with Securin
- You will be redirected to the Okta Sign in page, where you should enter the same email address here and click Next.
OKTA Verification Method
- Select a verification method.
Authentication Method
- Enter the password and click Verify.
Password Authentication
- Then, select the second authentication method.
Verification Method
- Enter the code and click Verify.
Verification Code
If you have already linked your Okta email address to the Securin application, you will see this page:
Account Actions
- In this case, click Add to Existing Account.
In the subsequent page, you will find the following instructions.
Instructions
- If you have not already received the verification code, click the first link to receive the code and verify.
- If your email address is already verified, click the second link.
- You will receive the link to verification in your email address. Click the link and follow the given steps.
Once you are done, you will be able to log in easily.
Customer Actions after Configuration
Finally, after completing the above steps, you need to send the following details to support@securin.io:
- A list of domains and subdomains associated with the email of the users added to SAML. (For example: If your users' email addresses are user1@securin.io, user2@marketing.securin.io, or user3@sales.securin.io, please send securin.io, marketing.securin.io, and sales.securin.io). This is needed for redirecting to your SAML application and will be stored to a field in SAML IdP on keycloak.
- Metadata Details, which can be found on the page displayed right after your configuration is set up.