/
Configuring Single Sign-on with Okta

Configuring Single Sign-on with Okta

Overview

Okta is one of the Identity Providers that your organization can configure for SSO and use to log in to your Zilla Security tenant.

Scope: Admins

This article covers the following topics:

Prerequisites

  • Admin account with Zilla Security

  • SSO has not been configured or SSO configuration has been deleted in admin settings

  • Okta account with admin privileges

Configure SSO Provider

  1. Log in to Zilla as an admin and click the Settings tab on the left side of the page. On the Discovery & Configuration tab, expand the Single Sign-On Provider dropdown and click Configure.

  1. Select the SAML option, and click Configure.

  1. A SAML Configuration dialog will open. Open a new tab and sign into your organization’s Okta account with admin privileges.

Add Zilla Security App in Okta

  1. On the Okta dashboard, switch to Classic UI if you’re on the Developer UI. If you are not logged in as an admin, you will not see these options.

  1. Select Applications from the Applications tab.

  1. Click Add Application in the Applications view.

  1. Click Create New App.

  1. A pop up will appear. Select Web as the platform and SAML 2.0 as the sign on method. Click Create.

  1. Fill in the General settings. Make the App Name: Zilla Security. You can also upload an App logo of our logo.

  2. Click Next.

Update SAML Settings & Attributes

  1. You should now see the SAML Settings Page. Copy the Zilla ACS URL and Audience URI from the Zilla SAML config into the Single Sign-On URL and Audience URI fields in the GENERAL section of the of Okta SAML Settings form.

  1. Zilla maps Okta users using their email address, so next, an email attribute needs to be set up. In the ATTRIBUTE STATEMENTS (OPTIONAL) section, add the custom profile parameters pictured in the screenshot below.

  1. Keep the other options as the default and click Next at the bottom of the SAML Settings page.

  2. On the final feedback page, select I'm an Okta customer adding an internal app, then click Finish.

  1. After you finish, you will see the application in the sign on section. It should say SAML 2.0 is not configured until you complete the setup instructions. Click View Setup Instructions.

A setup instruction page similar to the screenshot below will appear.

Zilla SAML Configuration

  1. Copy the Identity Provider Single Sign-On URL from the Okta setup page and paste it into the Zilla Security SAML config dialogs IDP SSO (Single sign-on) URL field.

  2. Copy the Identity Provider Issuer from the Okta setup page and paste it into the Zilla Security SAML config dialogs IDP Entity ID (Issuer) field.

  3. Finally, copy the X.509 Certificate from the Okta setup page and paste it into the Zilla Security SAML config dialogs IDP X.509 Certificate field. After following these steps, the Zilla Security SAML config dialog should look like the screenshot below.

  1. Before validation, users need to be assigned to the newly added app in Okta. Navigate back to the app instance and click Assign to Group in the Assign tab.

 

  1. Assign the app to the group Everyone. Click Assign and then click Done.

 

  1. You can now validate the integration inside of Zilla. Click Validate.

A green banner should appear indicating that your SSO configuration was successful.

Any reviewers, technical owners, or app owners can now log in to Zilla to see the apps and reviews they have been assigned.

When you have completed the steps above, review the information that was synced in Zilla. If you encounter any issues, please refer to our troubleshooting articles or visit support.zillasecurity.com and submit a ticket. Our support team will assist you in resolving the problem as quickly as possible.

Back to First Time Zilla Setup

Related content