How to configure Okta
Follow this step-by-step guide to configure the integration between Port and Okta using a SAML application.
To complete the process, you will need to contact us to receive the necessary information and provide the details Port requires from you.
The Port team will provide you with your CONNECTION_NAME
, which will be used in the SSO application's configuration.
Port-Okta integration benefits
- Connect to the Port application via an Okta app.
- Your Okta groups will be automatically synced with Port upon a user sign-in.
- Set granular permissions on Port according to your Okta groups.
Register a new application and generate the required credentials
- Sign in to your Okta Admin Console.
- Navigate to
Applications
and click onApplications
again. - Click on the
Create App Integration
button. - In the pop-up, select
SAML 2.0
and click onNext
. - In the
General Settings
, enter a name for the application and click onNext
. - On the
Configure SAML
page, underSAML Settings
, you’ll need to fill in some details:- Single sign on URL:
https://auth.getport.io/login/callback?connection={CONNECTION_NAME}
- Audience URI (SP Entity ID):
urn:auth0:port-prod:{CONNECTION_NAME}
- Single sign on URL:
- Scroll down to the
Attribute Statements (Optional)
section and add the following:email
, with theValue
set touser.email
given_name
, with theValue
set touser.firstName
family_name
, with theValue
set touser.lastName
- Click
Next
and thenFinish
to create the application.
Generate a Certificate and Send to Port
To secure the SAML integration, you need to generate a certificate and send it to Port:
- In the Okta Admin Console, navigate to
Applications
, and select the newly created SAML application. - Go to the
Sign On
tab and scroll down to theSAML Signing Certificates
section. - Click on
Generate new certificate
. - In the dialog, specify the certificate details such as the name and duration, then click
Generate
. - After generating the certificate, download it by clicking on the
Actions
button next to the new certificate and selectingDownload certificate
. Choose thePEM
format. - Send the PEM certificate file along with the Identity Provider metadata URL (available in the
Sign On
tab) to Port.
Expose Groups
To expose your Okta groups to Port via the application, follow these steps:
- In the
Sign On
tab of your Okta application, clickEdit
. - Scroll down to the
Group Attribute Statements
section. - Add a group attribute using the following settings:
- Name:
groups
- Filter:
Regex
- Value: Use a regular expression that matches the groups you wish to send to Port (e.g.,
.*
for all groups or a specific pattern).
- Name:
- Save your changes.
These groups will be ingested into Port as teams, enabling you to manage user permissions and RBAC in your Port account.
SCIM Configuration (beta)
Okta supports SCIM for SAML applications.
Functionality enabled by SCIM
By enabling SCIM the following functionality will be enabled:
- Automatic deprovisioning of users (for example, when a user is unassigned from the SSO application, he will automatically lose acccess to Port)
Setup SCIM
To set up SCIM for AzureAD SAML based applications, contact Port's support team.
You will be provided with:
- An SCIM
endpoint
- An SCIM
token
Once you have received the SCIM endpoint
and token
, follow Okta’s documentation on Setting Up SCIM in Okta to enable SCIM.
When configuring SCIM:
- Set the
Unique identifier field
touserName
. - For authenticating the SCIM connection, choose
HTTP Header
, and use the SCIMtoken
provided by Port.