How to configure Okta
Follow this step-by-step guide to configure the integration between Port and Okta using a SAML application.
info
To complete the process, you will need to contact us to receive the necessary information and provide the details Port requires from you.
The Port team will provide you with your CONNECTION_NAME
, which will be used in the SSO application's configuration.
Port-Okta integration benefits
- Connect to the Port application via an Okta app.
- Your Okta groups will be automatically synced with Port upon a user sign-in.
- Set granular permissions on Port according to your Okta groups.
Register a new application and generate the required credentials
- Sign in to your Okta Admin Console.
- Navigate to
Applications
and click onApplications
again. - Click on the
Create App Integration
button. - In the pop-up, select
SAML 2.0
and click onNext
. - In the
General Settings
, enter a name for the application and click onNext
. - On the
Configure SAML
page, underSAML Settings
, you’ll need to fill in some details:- Single sign on URL:
https://auth.getport.io/login/callback?connection={CONNECTION_NAME}
- Audience URI (SP Entity ID):
urn:auth0:port-prod:{CONNECTION_NAME}
- Single sign on URL:
- Scroll down to the
Attribute Statements (Optional)
section:- Add an attribute statement for
email
, with theValue
set touser.email
.
- Add an attribute statement for
- Click
Next
and thenFinish
to create the application.
Generate a Certificate and Send to Port
To secure the SAML integration, you need to generate a certificate and send it to Port:
- In the Okta Admin Console, navigate to
Applications
, and select the newly created SAML application. - Go to the
Sign On
tab and scroll down to theSAML Signing Certificates
section. - Click on
Generate new certificate
. - In the dialog, specify the certificate details such as the name and duration, then click
Generate
. - After generating the certificate, download it by clicking on the
Actions
button next to the new certificate and selectingDownload certificate
. Choose thePEM
format. - Send the PEM certificate file along with the Identity Provider metadata URL (available in the
Sign On
tab) to Port.
Expose Groups
To expose your Okta groups to Port via the application, follow these steps:
- In the
Sign On
tab of your Okta application, clickEdit
. - Scroll down to the
Group Attribute Statements
section. - Add a group attribute using the following settings:
- Name:
groups
- Filter:
Regex
- Value: Use a regular expression that matches the groups you wish to send to Port (e.g.,
.*
for all groups or a specific pattern).
- Name:
- Save your changes.
These groups will be ingested into Port as teams, enabling you to manage user permissions and RBAC in your Port account.