Enabling Single Sign-On Using Okta in Axon Data Governance 5.4

Similar documents
Enabling Single Sign-On Using Microsoft Azure Active Directory in Axon Data Governance 5.2

esignlive SAML Administrator's Guide Product Release: 6.5 Date: July 05, 2018 esignlive 8200 Decarie Blvd, Suite 300 Montreal, Quebec H4P 2P5

ComponentSpace SAML v2.0 Okta Integration Guide

RECOMMENDED DEPLOYMENT PRACTICES. The F5 and Okta Solution for High Security SSO

MyWorkDrive SAML v2.0 Okta Integration Guide

Add OKTA as an Identity Provider in EAA

Configuring Single Sign-on from the VMware Identity Manager Service to Marketo

Okta SAML Authentication with WatchGuard Access Portal. Integration Guide

Configuring Single Sign-on from the VMware Identity Manager Service to Collibra

Single Sign-On Administrator Guide

Google SAML Integration with ETV

INTEGRATING OKTA: VMWARE WORKSPACE ONE OPERATIONAL TUTORIAL VMware Workspace ONE

Configuring Single Sign-on from the VMware Identity Manager Service to Trumba

Single Sign-On Administrator Guide

Integration Guide. PingFederate SAML Integration Guide (SP-Initiated Workflow)

Configuring Single Sign-on from the VMware Identity Manager Service to Vizru

Integrating VMware Workspace ONE with Okta. VMware Workspace ONE

Webthority can provide single sign-on to web applications using one of the following authentication methods:

Table of Contents. Single Sign On 1

RSA SecurID Access SAML Configuration for Datadog

Configuring Confluence

Configuring Alfresco Cloud with ADFS 3.0

SAML 2.0 SSO. Set up SAML 2.0 SSO. SAML 2.0 Terminology. Prerequisites

Using Your Own Authentication System with ArcGIS Online. Cameron Kroeker and Gary Lee

Integrating the YuJa Enterprise Video Platform with Dell Cloud Access Manager (SAML)

Integration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for Okta

SafeNet Authentication Manager

Okta Integration Guide for Web Access Management with F5 BIG-IP

OneLogin SAML Authentication with WatchGuard Access Portal. Integration Guide

Quick Connection Guide

Integration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for PingFederate

Upland Qvidian Proposal Automation Single Sign-on Administrator's Guide

About This Document 3. Overview 3. System Requirements 3. Installation & Setup 4

RSA SecurID Access SAML Configuration for Kanban Tool

Slack Cloud App SSO. Configuration Guide. Product Release Document Revisions Published Date

Configuring and Delivering Salesforce as a managed application to XenMobile Users with NetScaler as the SAML IDP (Identity Provider)

SAML-Based SSO Solution

Configure Unsanctioned Device Access Control

Five9 Plus Adapter for Agent Desktop Toolkit

Juniper Networks SSL VPN Integration Guide

RSA SecurID Access SAML Configuration for StatusPage

Security Provider Integration SAML Single Sign-On

Security Provider Integration: SAML Single Sign-On

Oracle Utilities Opower Solution Extension Partner SSO

RSA SecurID Access SAML Configuration for Samanage

Mitel MiContact Center Enterprise WEB APPLICATIONS CONFIGURATION GUIDE. Release 9.2

All about SAML End-to-end Tableau and OKTA integration

SAML SSO Okta Identity Provider 2

SAML Authentication with Pulse Connect Secure and Pulse Secure Virtual Traffic Manager

SAML-Based SSO Configuration

Configuring and Delivering Salesforce as a managed application to XenMobile Users with 3 rd Party SAML IDP (Identity Provider)

Morningstar ByAllAccounts SAML Connectivity Guide

Integrating YuJa Active Learning into Google Apps via SAML

Advanced Configuration for SAML Authentication

SAML-Based SSO Solution

Nimsoft Service Desk. Single Sign-On Configuration Guide. [assign the version number for your book]

TACACs+, RADIUS, LDAP, RSA, and SAML

ISA 767, Secure Electronic Commerce Xinwen Zhang, George Mason University

CONFIGURING AD FS AS A THIRD-PARTY IDP IN VMWARE IDENTITY MANAGER: VMWARE WORKSPACE ONE OPERATIONAL TUTORIAL VMware Workspace ONE

SAP NetWeaver Cloud Security Tutorial Single Sign-On and Identity Federation with SAP NetWeaver Single Sign-On

MyWorkDrive SAML v2.0 Azure AD Integration Guide

This documentation will go over how to install Sharepoint for configuring with Panopto.

Integration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for Tableau Server

Configuring SAML-based Single Sign-on for Informatica Web Applications

Manage SAML Single Sign-On

This section includes troubleshooting topics about single sign-on (SSO) issues.

SafeNet Authentication Manager

Administering Workspace ONE in VMware Identity Manager Services with AirWatch. VMware AirWatch 9.1.1

CLI users are not listed on the Cisco Prime Collaboration User Management page.

Configuration Guide - Single-Sign On for OneDesk

Security Provider Integration SAML Single Sign-On

Using Microsoft Azure Active Directory MFA as SAML IdP with Pulse Connect Secure. Deployment Guide

Cloud Secure Integration with ADFS. Deployment Guide

IMPLEMENTING SINGLE SIGN-ON (SSO) TO KERBEROS CONSTRAINED DELEGATION AND HEADER-BASED APPS. VMware Identity Manager.

Integrating YuJa Active Learning into ADFS via SAML

ComponentSpace SAML v2.0 Configuration Guide

ComponentSpace SAML v2.0 Configuration Guide

Qualys SAML & Microsoft Active Directory Federation Services Integration

April Understanding Federated Single Sign-On (SSO) Process

SAML 2.0 SSO Implementation for Oracle Financial Services Lending and Leasing

Cloud Access Manager How to Configure for SSO to SAP NetWeaver using SAML 2.0

RSA SecurID Access SAML Configuration for Microsoft Office 365

SAP NetWeaver Cloud Security Tutorial Single Sign-On and Identity Federation with ForgeRock OpenAM

October 14, SAML 2 Quick Start Guide

ADFS Setup (SAML Authentication)

Google SAML Integration

RSA SecurID Access SAML Configuration for Brainshark

Authentication. August 17, 2018 Version 9.4. For the most recent version of this document, visit our documentation website.

BEST PRACTICES GUIDE MFA INTEGRATION WITH OKTA

VMware Identity Manager Administration. MAY 2018 VMware Identity Manager 3.2

Workday Deployment Guide Version 4.0

Authentication Guide

<Partner Name> <Partner Product> RSA SECURID ACCESS Implementation Guide. Pulse Connect Secure 8.x

Using a Web Services Transformation to Get Employee Details from Workday

Slack Connector. Version 2.0. User Guide

Configuring Single Sign-on from the VMware Identity Manager Service to Exterro E-Discovery

Integrating the YuJa Enterprise Video Platform with ADFS (SAML)

Setting Up Resources in VMware Identity Manager

.NET SAML Consumer Value-Added (VAM) Deployment Guide

WebEx Connector. Version 2.0. User Guide

Transcription:

Enabling Single Sign-On Using Okta in Axon Data Governance 5.4 Copyright Informatica LLC 2018. Informatica and the Informatica logo are trademarks or registered trademarks of Informatica LLC in the United States and many jurisdictions throughout the world. A current list of Informatica trademarks is available on the web at https://www.informatica.com/trademarks.html

Abstract This document describes the steps to enable Single Sign-On (SSO) in a cloud or on-premises deployment of Axon Data Governance 5.4 using the Okta identity management tool. Supported Versions Informatica Axon 5.4 Table of Contents Overview.... 2 Create a New Application in Okta.... 3 Configure Axon Details in Okta.... 3 Advanced Settings.... 4 Attribute Statements.... 4 Profile Editor.... 4 Generate SAML Metadata Assertion.... 6 Configure Axon to Use Okta.... 6 Clear the Axon Cache and Restart Services.... 7 Overview When you enable SSO, users with an account in the Identity Provider (IDP) of your organization can log in to the Axon web interface without entering a username and password. Axon uses Security Assertion Markup Language (SAML) 2.0 to authenticate users based on the IDP credentials. Okta is an enterprise IDP tool. If your organization uses Okta, you can set up Axon as the service provider and enable SSO using SAML. SAML is an XML-based open-standard data format for authorization and authentication between the IDP and the service provider. To enable SSO, you must configure Axon as an application in Okta. Axon supports any IDP that uses SAML 2.0 authentication. 2

The following image show the steps to configure SSO for Axon: Create a New Application in Okta Perform the following steps to set up Axon as an application in Okta: 1. Log in to Okta, and add a new SAML 2.0 application. 2. Type in the application name as Axon. Configure Axon Details in Okta To configure Axon as a SAML application, perform the following tasks in Okta: 1. In the Single Sign on URL field, enter the following value: http(s)://<axon_url>/saml/acs 2. Select the Use this for Recipient and Destination URL check box. 3. In the Audience URI (SP Entity ID) field, enter the following value: http(s)://<axon_url>/saml/metadata Note: Do not specify a value for the Default Relay State field. 4. In the Name ID Format field, select EmailAddress from the drop-down list. 5. In the Application Username field, select Email from the drop-down list. 6. Configure the advanced settings, attribute statements, and mandatory values. 3

Advanced Settings The following table lists the advanced settings that you must configure in Okta: Property Response Assertion Signature Signature Algorithm Digest Algorithm Assertion Encryption Enable Single Logout Authentication context class Honor Force Authentication SAML User ID Value Signed Signed RSA-SHA256 SHA256 Unencrypted Unchecked PasswordProtectedTransport Yes www.okta.com/$[org.externalkey] Attribute Statements The following table lists the attribute statements that you must configure in Okta: Property Format Value orgunit Basic appuser.orgunit status Unspecified appuser.statusid firstname Basic user.firstname lastname Basic user.lastname orgunitdescription Unspecified appuser.orgunitdescription orgunittitle Unspecified appuser.orgunittitle email Basic user.email Profile Editor To enable SSO, you must configure Okta to send the mandatory values required by Axon. 1. Open Profile Editor under Directory. 2. Click Profile against the Axon application that you created. 3. Edit the Okta attribute configuration. 4

The following table describes the Okta configuration for mandatory values required by Axon: Display Name Variable Name Data Type Username username string Organization Unit orgunit string First Name firstname string Last Name lastname string Org Unit Title orgunittitle string The following table describes optional values that you can enter: Display Name Variable Name Data Type Status ID statusid integer Organization Unit Description orgunitdescription string Note: Axon assigns the following default values to the statusid and orgunitdescription fields: If you do not select the statusid property, or if you select the statusid property and do not assign a default value, Axon assigns the Active value to all the users. If you do not select the orgunitdescription property, or if you select the orgunitdescription property and do not assign a default value, Axon assigns a blank value to all organization units. 5

Generate SAML Metadata Assertion After you configure Axon in Okta, perform the following steps in Okta to obtain the SAML metadata assertion: 1. In the Sign On tab, click the View Setup Instructions button. 2. Record the values for the following parameters that you see: Identity Provider Single Sign-On URL Identity Provider Issuer X.509 Certificate You must enter these values when you configure Axon. Note: The SAML metadata is based on the configuration parameters that you have entered in Okta. If you modify any of the parameters in Okta, you must perform the above steps again to get the new SAML metadata values. Configure Axon to Use Okta After you create Axon as an application in Okta, you must configure Axon to authorize and authenticate the data that is exchanged with Okta. You must have the Super Admin profile to perform this task. Perform the following configuration steps in Axon to use SSO: 1. From the Axon toolbar, click the Admin Panel menu item under your user name. 2. In the menu on the left, under the Customize & Configure category, click Configure Axon. 3. In the Group dropdown, select SAML Configuration. 4. Click Edit. 6

5. Enter the following values: Field SSO URL IDP Endpoint IDP Entity ID IDP X.509 Certificate Value http(s)://<axon_url>:<port_number>/saml/login Identity Provider Single Sign-On URL that you recorded. Identity Provider Issuer value that you recorded. X.509 Certificate that you recorded. Note: Enter this value in a single line without line breaks. 6. Click Save. Clear the Axon Cache and Restart Services After you have configured Axon in the IDP and configured the Axon SAML files, you must update the Axon cache with the new configuration values. 1. In the Linux environment, run the following command to clear the contents of the cache directory: rm -rf <INSTALLATION_DIRECTORY>/axonhome/axon/app/cache/* 2. Run the following commands to restart the Memcached and HTTPD services: <INSTALLATION_DIR>/axonhome/third-party-app/scripts/memcached restart service httpd restart Author Abhilash Scariya Lead Technical Writer Acknowledgements Pradeep G.N. Lead QA Engineer 7