It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda SecureEdge

How to Configure Okta for Authentication

  • Last updated on

This article covers the configuration of Okta for authentication. Use the following steps to create an Okta SAML application to use with SecureEdge. You can find more information in this Okta tutorial.

Configure SAML

  1. Log into your Okta organization as a user with administrative privileges.

  2. Create a new application by selecting Applications and click Add Application.

    ec-saml-okta-new-app.png

  3. Select Create New App.

    ec-saml-okta-create-new-application.png

  4. Configure custom application type. Specify values for the following:

    1. Platform – Select Web.

    2. Sign on method – Select SAML 2.0.

  5. Click Create to continue.

    ec-saml-okta-new-app-type-01.png

  6. Configure custom application type:

    • Insert the desired App name (for example: Fyde Enterprise Console).

  7. Select Next to continue.

    ec-saml-okta-general-settings-01.png

  8. In this menu, the values will be used that were obtained from Step 8, e.g., Entity ID and ACS URL in How to Configure SAML 2.0 Configuration:
    Specify values for the following:

    • Single sign on URL (Assertion Consumer Service URL) – Enter the ACS URL obtained from Step 8 for the SAML 2.0 configuration.

    • Use this Recipient URL and Destination URL – Ensure the check box is selected.

    • Audience URI (SP Entity ID) – Enter the Entity ID obtained from Step 8 for the SAML 2.0 configuration.

    • Application username – Ensure is set to Email.

    • Leave the remaining fields in their default values (as shown).

  9. Select Show Advanced Settings to continue.

    ec-saml-okta-settings-01.png

  10. In the Advanced Settings section, ensure that all the values are set as below.

    ec-saml-okta-settings-advanced-01.png

  11. Click Next to continue.

  12. Configure feedback and click Finish.

    ec-saml-okta-feedback-01.png

  13. Get provider definitions by selecting Sign On and View Setup Instructions.

    • Use the values obtained to continue the Step 8 configuration, e.g., Entity ID and ACS URL in How to Configure SAML 2.0 Configuration:

    • Identity Provider Issuer - Entity ID

    • Identity Provider Single Sign-On URL - SSO URL

    • X.509 Certificate - Certificate

      ec-saml-okta-provider-01.png

  14. This app must be assigned to users:

Ensure that you configure the desired assignments.

ec-saml-okta-assign-01.png