Configuring Reasons for Access with Okta.
This guide provides the steps required to configure SAML with Okta, and includes the following sections:
Features
The following SAML features are supported:
IdP-initiated SSO
SAML authentication initiated by the IdP (Okta).
Just-In-Time provisioning
When a new user is sent from Okta, a new user is created just before login.
Grant type
The used grant type is, passed from Okta.
Configuration Steps
- Copy the Metadata URL from the Okta Admin Console, SAML 2.0 Sign on methods section.
- Contact the reasons for access support team (support@fuselogic.nl) and request that they enable SAML 2.0 for your account. Include the "Metadata URL" value from the previous step. The reasons for access support team processes your request.
- Create the
grantType
attribute in the Profile Editor.
-
Variable name:
grantType
-
Enum:
- Value:
autoGranted
- Value:
authorizedRequest
- Value:
allowedRequest
- Value:
- Required:
Yes
- Attribute Type:
Group
-
Variable name:
- Add the
grantType
attribute to the SAML attributes.- Click
Edit
and openAttributes (Optional)
. Note: This only shows up, after you clickEdit
- Add attribute
grantType
with valueappuser.grantType
- Click
- We recommend using groups to assign users, to the Reasons for Access application. And to set the grant-type for the group.
- Create three Okta groups for each grant type:
Auto Granted, Authorized Request, Allowed Request
- Assign the groups to the application with the correct grant type.
- Assign users to the correct groups.
- Create three Okta groups for each grant type:
Known Issues/Troubleshooting
- When you do not see all values make sure the grantType is set correctly.
- Only the IdP-initiated flow is supported. Based on your used IdP, you are sent to the correct customer environment.
- The SP-initiated flow is not supported.