Configuring Single Sign-on with Okta
Overview
Okta is one of the Identity Providers that your organization can configure for SSO and use to log in to your Zilla Security tenant.
Scope: Admins
This article covers the following topics:
Prerequisites
Admin account with Zilla Security
SSO has not been configured or SSO configuration has been deleted in admin settings
Okta account with admin privileges
Configure SSO Provider
Log in to Zilla as an admin and click the
Settings
tab on the left side of the page. On theDiscovery & Configuration
tab, expand theSingle Sign-On Provider
dropdown and clickConfigure
.
Select the
SAML
option, and clickConfigure
.
A SAML Configuration dialog will open. Open a new tab and sign into your organization’s Okta account with admin privileges.
Add Zilla Security App in Okta
On the Okta dashboard, switch to
Classic UI
if you’re on theDeveloper UI
. If you are not logged in as an admin, you will not see these options.
Select
Applications
from theApplications
tab.
Click
Add Application
in the Applications view.
Click
Create New App
.
A pop up will appear. Select
Web
as the platform andSAML 2.0
as the sign on method. ClickCreate
.
Fill in the General settings. Make the App Name:
Zilla Security
. You can also upload anApp logo
of our logo.Click
Next
.
Update SAML Settings & Attributes
You should now see the SAML Settings Page. Copy the
Zilla ACS URL
andAudience URI
from theZilla SAML config
into theSingle Sign-On URL
andAudience URI
fields in theGENERAL
section of the of Okta SAML Settings form.
Zilla maps Okta users using their email address, so next, an email attribute needs to be set up. In the
ATTRIBUTE STATEMENTS (OPTIONAL)
section, add the custom profile parameters pictured in the screenshot below.
Keep the other options as the default and click
Next
at the bottom of the SAML Settings page.On the final feedback page, select
I'm an Okta customer adding an internal app
, then clickFinish
.
After you finish, you will see the application in the sign on section. It should say
SAML 2.0 is not configured until you complete the setup instructions
. ClickView Setup Instructions
.
A setup instruction page similar to the screenshot below will appear.
Zilla SAML Configuration
Copy the
Identity Provider Single Sign-On URL
from the Okta setup page and paste it into the Zilla Security SAML config dialogsIDP SSO (Single sign-on) URL
field.Copy the
Identity Provider Issuer
from the Okta setup page and paste it into the Zilla Security SAML config dialogsIDP Entity ID (Issuer)
field.Finally, copy the
X.509 Certificate
from the Okta setup page and paste it into the Zilla Security SAML config dialogsIDP X.509 Certificate
field. After following these steps, the Zilla Security SAML config dialog should look like the screenshot below.
Before validation, users need to be assigned to the newly added app in Okta. Navigate back to the app instance and click
Assign to Group
in theAssign
tab.
Assign the app to the group
Everyone
. ClickAssign
and then clickDone
.
You can now validate the integration inside of Zilla. Click
Validate
.
A green banner should appear indicating that your SSO configuration was successful
.
Any reviewers, technical owners, or app owners can now log in to Zilla to see the apps and reviews they have been assigned.
When you have completed the steps above, review the information that was synced in Zilla. If you encounter any issues, please refer to our troubleshooting articles or visit support.zillasecurity.com and submit a ticket. Our support team will assist you in resolving the problem as quickly as possible.