In this article you will find the necessary steps to configure a connection between Okta and Mosaic's authentication platform to establish a Single-Sign-On experience for your enterprise users using Mosaic.
If at any time there are questions or issues with the connection, please reach out to support@mosaic.pe for assistance.
Okta Configuration
- In the Okta Developer Console, choose Applications > Applications > Create App Integration. Choose SAML 2.0 as the Sign-in method.
- Enter “Mosaic” for the app name, and you can use the this logo (or the one attached below) if desired for the directory listing.
- Under General, for the Single Sign On URL, use https://auth.mosaic.pe/saml2/idpresponse
- For Audience URI / SP Entity ID, use urn:amazon:cognito:sp:us-east-1_snwpaAR4h
- For Name ID Format, choose Email Address
- Under Attribute Statements, use the following Name/Value combinations:
- Name: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress
Value: user.email - Name: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname
Value: user.firstName - Name: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname
Value: user.lastName
- Name: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress
- On the Assignments tab, choose Assign to People and assign your local users permission to Mosaic accordingly.
- On the Sign On tab, find the Identity Provider Metadata hyperlink and either copy/paste that URL to us, or save the file at the resulting URL and email to support@mosaic.pe.
Note: If you are utilizing the directory listing, you will need to create a separate bookmark link to https://app.mosaic.pe/login/<your primary domain>
and hide the authorization entry from the directory. Otherwise, users attempting to log in via the directory listing may receive and Invalid samlResponse or relayState from identity provider
. See Okta's documentation for additional context.
Mosaic Configuration
Once you have completed the steps above, please email support@mosaic.pe with the metadata from Step 7, as well as a list of all possible domains that might be authenticating via your Okta instance. For example: yourdomain.com, yourdomain.net, etc.
SSO User Provisioning
Mosaic supports user provisioning to enable Okta to automatically create and disable user accounts within Mosaic depending on their application access. We recommend following the additional steps to enable this functionality. Note this can only be completed once SSO has been successfully established for your organization.
1. Obtain your Provisioning Token
- Login to Mosaic as a user with admin permissions.
- Navigate to your organization admin page by clicking on your account name in the top right corner, and selecting "Admin"
- Navigate to the "Integrations" page using the left sidebar
- Find the SCIM User Provisioning integration, and click "Install", and then "Generate Token".
- Copy the Base URL and API Token
Note: The token is only visible once and is valid for 365 days. Creating a new token will invalidate the previously used token.
2. Enable SSO User Provisioning in Okta
- Login to Okta and find the Mosaic application
- Click Provisioning
- Click Configure API Integration
- Set the Unique Identifier Field for Users to userName
- Ensure the Authentication Mode is HTTP Header
- Enable the API Integration and paste the Base URL and API Token from above.
- Click Test API Credentials
- Click Save once the credentials are tested successfully.
- Click the "To App" tab and click Edit
- Select the checkboxes for Create Users, Update User Attributes, and Deactivate Users, then click Save.
- Click the "To Okta" tab and click "Edit" under the User Creation & Matching section
- In the Imported user is an exact match to Okta user if section, select Email Matches
- Click Save
- If you have previously assigned users to the application, you may need to force sync to initialize the provisioning connection.
Comments
0 comments
Please sign in to leave a comment.