Configuring Okta For SSO
DataGrail supports two configurations for Okta SSO. You only need to choose one.
Configuration | Best For | Roles Managed In |
---|---|---|
Standard Configuration | Most customers. | DataGrail |
Group Provisioning | Large organizations. | Okta |
Standard Configuration
This section documents the standard configuration for Okta as an identity provider to support log in to the DataGrail app. With this configuration, user roles must be managed within DataGrail.
Persons Needed to Complete Configuration: IT Person from your organization
-
Sign in to Okta as an admin.
-
Navigate to Applications in the left-hand menu and select Browse App Catalog to search for DataGrail.
-
Select the Add Integration.
-
Enter your DataGrail subdomain and select Done.
Finding Your Subdomain
<subdomain>
should be replaced with the subdomain configured for your DataGrail account. For example, if you log in to DataGrail atyourcompanyname.datagrail.io
, your subdomain isyourcompanyname
.If you are unclear on what your subdomain would be, please confirm with your Account Manager or reach out to support@datagrail.io.
-
When redirected back to the Applications Page, select the DataGrail Application and navigate to the Sign On tab.
-
Scroll down to the SAML Signing Certificates section. You should see an active certificate that is automatically created.
-
Select the Actions dropdown and View IdP Metadata (this should open in another tab).
-
Copy the URL of the Identity Provider Metadata.
-
Send the metadata URL to DataGrail at support@datagrail.io. We will complete the configuration.
Please visit Inviting New Users for more instructions on adding users and managing roles.
Group Provisioning
The Group Provisioning functionality is best for advanced users that would like to provision roles automatically based on group assignments within Okta. You cannot manage user roles within DataGrail using this configuration.
Persons Needed to Complete Configuration: IT Person from your organization
Creating the Okta App
The Group Provisioning configuration requires a custom Okta App. You cannot use the DataGrail app in the Okta catalog to complete this configuration.
-
Sign in to Okta as an admin.
-
Navigate to Applications in the left-hand menu and select Create App Integration and choose SAML 2.0.
SAML Application Configuration
- Single Sign On URL:
https://<subdomain>.datagrail.io/saml/auth
- Audience URI (SP Entity ID):
https://<subdomain>.datagrail.io/saml/metadata
<subdomain>
should be replaced with the subdomain configured for your DataGrail account. For example, if you log in to DataGrail atyourcompanyname.datagrail.io
, your subdomain isyourcompanyname
.If you are unclear on what your subdomain would be, please confirm with your Account Manager or reach out to support@datagrail.io.
- Single Sign On URL:
-
Select next and create the application.
-
When redirected back to the Applications Page, select the DataGrail Application and navigate to the Sign On tab.
-
Scroll down to the SAML Signing Certificates section. You should see an active certificate that is automatically created.
-
Select the Actions dropdown and View IdP Metadata (this should open in another tab).
-
Copy the URL of the Identity Provider Metadata.
-
Send the metadata URL to DataGrail at support@datagrail.io. We will complete the configuration.
Determining Group Mappings
In order to utilize the Group Mapping functionality, mappings between the Okta groups and DataGrail roles must be configured on the DataGrail side.
- Review DataGrail Roles and Permissions.
- Determine what DataGrail roles you want to map to your Okta groups. You can have multiple Okta groups map to the same DataGrail role.
- Once you have established your mappings, please send them support@datagrail.io to be configured.
Configuring Attribute Statements
Once DataGrail support confirms the mappings have been set, the attribute statements can now be configured within Okta:
-
Navigate back to the Okta app you created in the first section and select the General tab.
-
Select Edit in the SAML Settings section.
-
Select Next to get to the Configure SAML tab. Scroll down to Group Attribute Statements.
-
For each of the mappings you have defined, create a new attribute statement with the name
roles
and utilize the filters to associate this with the correct group. -
Additionally, scroll up to Attribute Statements and configure the following attribute statements:
Attribute Statement Configuration
First Name
- Name:
first_name
- Value:
user.firstName
Last Name
- Name:
last_name
- Value:
user.lastName
Email
- Name:
email
- Value:
user.email
- Name:
-
Select Next and save your changes.
For more information on adding users and managing roles, see Inviting New Users.
Disclaimer: The information contained in this message does not constitute as legal advice. We would advise seeking professional counsel before acting on or interpreting any material.