Okta

Overview

Okta SAML SSO allows your users to sign in to VGS Dashboard using your existing Okta account. Follow the manual to configure the VGS Okta application.

Setup

1. Sign in to the Okta Console.

2. Add application

  • In the Admin Console, go to Applications > Applications and click Add Application.

3. Search for the VGS application

  • In the Search for an application field, enter VGS and select Very Good Security.

4. Add the VGS application

  • Click Add.

5. Complete the fields on the General Settings page

  • Assign the Application label and click Done.

6. Copy Identity Provider metadata URL

  • In the Settings section of the Sign On pane navigate to SAML 2.0 and copy the Identity Provider metadata URL.

You need to activate your organization before you proceed with custom IDP SSO setup.

  • Scroll down to the SAML Settings section.

  • Paste the Identity Provider metadata URL from the previous step in the Metadata URL field.

  • Click Save.

  • After metadata processing, you will be able to switch the Enable SAML SSO for this organization toggle.

8. Copy the Organization ID

  • Scroll up to the General Settings section and copy the Organization ID needed for the next step.

9. Finish VGS application configuration

  • Return to the Okta Admin Console.

  • In the Settings section of the Sign On pane click Edit.

  • Scroll down to the Advanced Sign-on Settings section.

  • Paste the Organization ID from the previous step.

  • Change the Application username format to Email.

  • Click Save.

10. Assign users to the VGS application

  • In the Assignments pane click Assign and assign the VGS application to people or groups.

11. Now assigned users can use the VGS application to visit VGS Dashboard

Once Okta is configured, the preferred path for login for your users is to use Okta.

If they navigate directly to the dashboard, they will need to use the specific Login URL specified in the SAML Settings to ensure that they login via SSO

If they don't use that Login URL, the dashboard will log them in without using SSO and they may not be able to access your organization.

Next steps

Last updated