Connecting SSO with Okta¶
This guide covers the process of connecting the Okta service as an identity provider to Wallarm, which acts as the service provider.
To fulfill steps, you need accounts with administration rights both for Wallarm and Okta.
Step 1 (Wallarm): Activate SSO service¶
By default, SSO service for authentication in Wallarm is not active, corresponding blocks are not visible in the Integrations section in Wallarm Console.
To activate the SSO service, contact the Wallarm support team.
Step 2 (Wallarm): Generate metadata¶
You need Wallarm metadata to enter on the Okta side:
-
In Wallarm Console, go to Integrations → SSO SAML AUTHENTICATION and initiate the Okta SSO configuration.
-
In the SSO configuration wizard, at the Send details step, overview the Wallarm metadata, that should be passed to the Okta service.
- Wallarm Entity ID is a unique application identifier generated by the Wallarm application for the identity provider.
- Assertion Consumer Service URL (ACS URL) is the address on the Wallarm side of the application on which identity provider sends requests with the SamlResponse parameter.
-
Copy metadata or save them as XML.
Step 3 (Okta): Configure application¶
To configure application in Okta:
-
Log in to Okta as administrator.
-
Click Administrator → Dashboard → Add Applications.
-
Click Create New App.
-
Set:
- Platform → “Web”.
- Sign‑on method → “SAML 2.0”.
-
Proceed and in the Create SAML Integration wizard set general integration settings, such as App Name and optionally App logo.
-
Proceed and enter the Wallarm's metadata. Required fields:
-
Optionally, set other parameters described in Okta documentation.
-
Proceed and set Are you a customer or partner to "I'm an Okta customer adding an internal app".
-
Optionally, set other parameters.
-
Click Finish. You will be redirected to the page of the created application.
-
To get Okta metadata, go to the Sign On tab, do one of the following:
- Click Identity Provider metadata and save displayed data as XML.
- Click View Setup instructions and copy displayed data.
-
Provide Okta users with access to the created application by going to Administrator → Dashboard → Assign Applications and assigning users to the application.
Step 4 (Okta): Configure provisioning¶
The provisioning is an automatic transfer of data from SAML SSO solution (Okta) to Wallarm: your Okta users and their group membership define access to Wallarm and permissions there; all user management is performed on Okta side.
For this to work, provide the attribute mapping:
-
In Okta application, map:
email
first_name
last_name
-
user group(s) to
wallarm_role:[role]
whererole
is:admin
(Administrator)analytic
(Analyst)api_developer
(API Developer)auditor
(Read Only)partner_admin
(Global Administrator)partner_analytic
(Global Analyst)-
partner_auditor
(Global Read Only)See all role descriptions here.
-
Save the changes.
Step 5 (Wallarm): Enter Okta metadata¶
-
In Wallarm Console, in the SSO configuration wizard, proceed to the Upload metadata step.
-
Do one of the following:
-
Complete SSO configuration wizard. Wallarm will test if data to/from your Okta can now be transferred.