Getting Started
π SAML Integration - Okta
To connect to Myrror using SAML with Okta, please follow the instructions below.
Create a New Okta Application
-
Go to the Applications tab and click on the Create App Integration button.
-
Select SAML 2.0 from the list of Sign-In methods and click Next.
Create SAML Integration
After your application is created, it's time to create a SAML integration.
General Settings
-
Choose an App Name, like "Myrror Security".
-
Click Next.
Configure SAML
Fill out the rest of the configuration settings based on the following example settings.
General:
- Single Sign-On URL: For example,
https://blindspot-security.eu.auth0.com/login/callback?connection=company_name
- Audience URI (SP Entity ID): For example,
urn:auth0:blindspot-security:company_name
- Default RelayState: Empty
- Name ID Format: EmailAddress
- Application Username: Email
- Update Application Username On: Create and update
Advanced Settings:
- Response: Signed
- Assertion Signature: Signed
- Signature Algorithm: RSA-SHA256
- Digest Algorithm: SHA256
- Assertion Encryption: Unencrypted
- SAML Single Logout: Disabled
- Signed Request: Disabled
- Authentication Context Class: PasswordProtectedTransport
- Honor Force Authentication: Yes
- SAML Issuer ID:
http://www.okta.com/${org.externalKey}
Attribute Statements:
- Name: email
- Name Format: Unspecified
- Value: user.email
When done filling the fields above, click Next.
Feedback
App Type: This is an internal app that we have created.
Post Connection Creation
-
Copy and download the following details (under More Details):
- Signing Certificate
- Sign-on URL
-
Add Users or Groups to the Connection:
- Navigate to the Assignments tab and click on the Assign button.
- Choose to assign People or Groups.
- Make sure to assign the invitee to the connection created.