You are here:
Configure Okta IdP for FedRAMP Single Sign-on
Users can set their own authentication using a managed Identity Provider instead of relying on local authentication for passwords and security policies. Okta single sign-on is supported using SAML 2.0 authentication.
Own has a pre-built app available in Okta's Integration Network (OIN). Prepare Okta to integrate with the Own OIN app.
For more information on enabling Okta as a managed Identity Provider, review Okta support documentation: Build a Single Sign-On (SSO) integration.
- Open Okta.
- Navigate to the Applications page.
- Click Create App Integration.
- Select SAML 2.0 and click Next.
- Enter an App name, change the App logo if desired, and click Next.
-
In the SAML Settings window, enter the required information and click Next.
- Single sign-on URL: https://us2.ogc-ownbackup.com/saml/consume.
- Audience URI (SP Entity ID): https://sso-us2.ogc-ownbackup.com.
- Name ID format: Select EmailAddress from the drop-down list.
- Application username: Select Email from the drop-down list.
- Select the Feedback option that applies and click Finish. The newly created app is automatically displayed.
- Select the Assignments tab and assign users to the application.
- Select the Sign On tab to view the SAML 2.0 connection information required for enabling single sign-on. On the right of the page, click View SAML setup instructions.
- A configure page opens. Download the X.509 Certificate and copy the Identity Provider Issuer.
- Test the new app by using the Identity Provider Single Sign-On URL. Navigate to the Own Data Platform to complete the process of enabling single sign-on.

