Skip to main content

Okta

SSO Okta SSO Okta

To configure Okta as an SSO identity provider, click the button Configure New SSO in the Single-Sign On section of the organization admin settings. Then proceed with the steps below.

Step 1. Settings

Okta Step 1 Okta Step 1

In the first step, select Okta as the identity provider. Then select the e-mail domains for which you want to setup SSO with Okta. Finally, choose how new users should be handled. Then select Next.

Step 2. Configure Okta

Okta Step 2 Okta Step 2

Copy the Single sign-on URL and the Audience URI. Then open the Okta Admin Console and select Applications in the left-hand navigation.

Okta Admin Console Step 1 Okta Admin Console Step 1

Select Create App Integration.

Okta Admin Console Step 2 Okta Admin Console Step 2

In the dialog that opens, select SAML 2.0 as the Sign-in method. Then click Next.

Okta Admin Console Step 3 Okta Admin Console Step 3

In the General Settings, enter Cluvio as the App name. Optionally upload a Cluvio logo as the App logo. Then click Next.

Okta Admin Console Step 4 Okta Admin Console Step 4

Paste the Single sign-on URL and the Audience URI copied from Cluvio into the equivalently named fields. Choose EmailAddress for the Name ID format and Email for the Application username.

Okta Admin Console Step 5 Okta Admin Console Step 5

In the Attribute Statements section, create two attribute mappings for firstname and lastname as shown below. Then click Next.

Okta Admin Console Step 6 Okta Admin Console Step 6

You may now optionally provide feedback to Okta. Click Finish to complete the Okta app configuration.

Okta Admin Console Step 7 Okta Admin Console Step 7

You should now land on the detail page of your newly created app integration, with the Sign On tab selected. Copy the Metadata URL from the settings section, highlighted below.

Okta Admin Console Step 8 Okta Admin Console Step 8

Return to Cluvio to proceed with step 3.

Step 3. Configure Cluvio

Okta Step 3 Okta Step 3

Enter the Metadata URL copied at the end of the previous step from the Okta Admin Console into the provided input field. It will be validated and processed automatically. When the URL is valid and the Okta SAML Metadata was successfully loaded into Cluvio, you will see the message Metadata successfully loaded!. Click Next to proceed.

Step 4. User Access

Okta Step 4 Okta Step 4

You must now enable access to Cluvio for your Okta users in the Okta Admin Console. Follow the instructions shown to navigate to your Cluvio app integration in the Okta Admin Console and open the Assignments tab.

Okta Admin Console User Access Okta Admin Console User Access

Assign people and groups as desired. Grant access at least to your own Okta user account, in order to be able to verify the SSO configuration. After completing user and group assignments in the Okta Admin Console, return to Cluvio and click Next to proceed with step 5.

Step 5. Verification

Okta Step 5 Okta Step 5

Your Cluvio SSO configuration is now complete, but in order for the configuration to be activated and SSO logins to be enabled, it must be verified. Click Verify Configuration. Cluvio will open a popup window that performs SSO authentication with your identity provider and your Cluvio email address. If you are currently authenticated with the identity provider the popup closes automatically and you see a success message.

Okta Step 5 Success Okta Step 5 Success

At this point, all future Cluvio logins for users with e-mail addresses in the configured domains will redirect to Okta for authentication and Okta will redirect back to Cluvio when authentication is successful. Click Close to close the SSO setup wizard.

Reconfiguration

To reconfigure Okta SSO, select Reconfigure in the SSO config drop-down menu in the organization admin section. The following dialog is shown.

Okta Done Okta Done

In the Cluvio tab of the reconfiguration dialog you can see the Okta metadata URL that Cluvio is using to periodically check for new certificates. Select Show Metadata to reveal the SAML metadata, including the certificates that Cluvio is currently using.

Select Reload Metadata to reload the Okta SAML metadata from the metadata URL. If Cluvio detects any changes, it will be indicated in the dialog. There are two use-cases for reloading metadata: Updating certificates or changing the Cluvio SSO configuration to link with a completely new Okta app integration. While the former needs to be done when the existing certificates expire, the latter is only necessary if you intentionally want to delete and reconfigure your Okta app integration for Cluvio.

In the Okta tab of the reconfiguration dialog you can see the Cluvio metadata that must be used in the configuration of the Okta app integration in the Okta Admin Console.

Updating Certificates

To replace an expiring certificate used by your Okta app integration for Cluvio, open the app configuration in the Okta Admin Console. The single sign-on section shows the SAML Signing Certificates.

Okta Admin Console Certificates Okta Admin Console Certificates

Click Generate new certificate to create a new certificate. Only one certificate is active at any time. The active certificate is used by Okta to sign SSO assertions sent to Cluvio after successful authentication. Activate the new certificate.

To update Cluvio with the new certificate, reconfigure the Okta SSO configuration in Cluvio and select Reload Metadata. You should see an indication that the metadata changed. Click Save & Verify to save the new metadata and verify that the SSO configuration is functional. Verification opens a popup that authenticates with Okta using your Cluvio email address. If verification fails, the previous metadata is automatically restored.

Certificate Update Notifications

Cluvio periodically polls the Okta metadata URL to check for new certificates and periodically checks for upcoming expiration of currently used certificates. If a new or expiring certificate is detected, an email notification is sent to the admins in your Cluvio organization.