Okta SSO via SAML

Setting up Okta via SAML

Set up SSO for OKta using SAML. For a general overview on SAML, see Setting up SAML2 Federated SSO.

If you do not see SAML in the SSO list, please create a support ticket to enable SAML for your account.

Setting up SAML SSO for Okta includes:

  1. Configuring SSO settings for Okta via SAML in Codefresh
  2. Configuring SSO settings for Codefresh in JumpCloud
  3. Completing SSO configuration for JumpCloud in Codefresh

Step 1: Configure SSO settings for Okta via SAML in Codefresh

Create a SAML account for Okta in Codefresh to create an integration for Codefresh in Okta.

  1. In the Codefresh UI, from the toolbar click the Settings icon.
  2. In the sidebar, from Access & Collaboration, select Single Sign-On.
  3. Click Add single-sign-on, select SAML, and then click Next.
  4. Enter the connection details:
    • Display Name: Any name you want for the integration.
    • IDP Entry: Type in any character. You will enter the correct value from Okta in the final step.
    • Application Certificate: You will enter the correct value from Okta in the final step.
    • Provider: Leave empty.
  5. Click Add. The SAML integration for Okta is added and appears in the list of SSOs.
  6. In the Single Sign-On page, click the Edit icon for the Okta SAML integration you created.
  7. Copy the Assertion URL (client ID) that was automatically generated when you added the integration.
  8. Continue with Step 2: Configure SSO settings for Codefresh in Okta.

Step 2: Configure SSO settings for Codefresh in Okta

  1. Navigate to Applications.
  2. Select Create App Integration > SAML2.0, and click Next.
  3. General Settings:
    • Fill in the Name and any other settings you need.
    • Click Next.
  4. Configure SAML:
    • Single Sign On URL:
    • ACS URL: Enter the Assertion URL (Callback URL) generated in Codefresh.
    • Audience URL: g.codefresh.io
    • Name ID Format: EmailAddress
    • Attribute Statements
      • Leave Name Format as Unspecified
      • firstName: user.firstName
      • lastName: user.lastName
      • email: user.email
    • Click Next.
  5. Feedback:
    • If displayed, complete the form.
    • Click Finish.
  6. Sign On Tab:
    • Select View SAML Setup Instructions on the right.
    • Keep the page open as you will need it to complete the setup for Okta in Codefresh.
  7. Continue with Step 3: Configure SSO settings for Codefresh in Okta.

Step 3: Complete SSO configuration for Okta in Codefresh

Complete SSO setup for Okta via SAML in Codefresh.

  1. IDP Entry: The IDP URL from the SSO tab in Okta.
  2. Application Certificate: Copy and paste the content between -----BEGIN CERTIFICATE----- and -----END CERTIFICATE----- from the certificate you downloaded into the field. You can also include the BEGIN and END lines.
    • Note: You will get a warning when editing the Certificate section.
  3. Click Save.

You have completed SSO integration for OKta via SAML in Codefresh.

Test SSO connection

Now test the SSO with a test user in a different browser or private/incognito browser to make sure the integration works as it should.

  1. In the Codefresh UI, on the toolbar, click the Settings icon and then select Account Settings.
  2. From the sidebar, below Access & Collaboration, select Users & Teams.
  3. Locate a test user, and from the SSO list, select the integration name to enable SSO for that user.
  4. In a different browser or private/incognito browser window use the Corporate option to log in.

Federated Single Sign-On (SSO) overview
Setting up SAML2 Federated SSO
Common configuration for SSO providers