Skip to main content
All CollectionsCloudGen Access Docs
How to Configure Okta for Authentication
How to Configure Okta for Authentication
Barracuda Admin avatar
Written by Barracuda Admin
Updated over 2 years ago

Use the following steps to create an Okta SAML application to use with CloudGen Access Enterprise Console.

  • These steps are also found in this Okta tutorial.

  • This tutorial was created with Okta Version 2019.03.2

Configure SAML

  1. Log into your Okta organization as a user with administrative privileges.

  2. Create a new application by selecting Applications and then Add Application.

    ec-saml-okta-new-application.png
  3. Select Create New App.

    ec-saml-okta-create-new-app.png
  4. Configure custom application type:

    1. Select Platform Web.

    2. Select Sign on method SAML 2.0.

  5. Click Create to continue.

    ec-saml-okta-new-app-type.png
  6. Configure custom application type:

    • Insert the desired App name (for example: Enterprise Console).

  7. Select Next to continue.

    ec-saml-okta-general-settings.png
  8. In this menu, the values will be used that were obtained from Step 2 in How to Configure SAML 2.0 Configuration:
    Fill in the following:

    • Single sign on URL (Assertion Consumer Service URL)

    • Ensure the Use this Recipient URL and Destination URL check box is selected.

    • Audience URI (SP Entity ID)

    • Ensure Application username is set to Email.

    • Leave the remaining fields to defaults (as shown).

  9. Select Show Advanced Settings to continue.

    ec-saml-okta-settings.png
  10. In the Advanced Settings section, ensure that all the values are set as below.

    ec-saml-okta-settings-advanced.png
  11. Click Next to continue.

  12. Configure feedback and click Finish.

    ec-saml-okta-feedback.png
  13. Get provider definitions by selecting Sign On and View Setup Instructions.

    • Use the values obtained to continue the Step 3 configuration in How to Configure SAML 2.0 Configuration:

    • Identity Provider Issuer - Entity ID

    • Identity Provider Single Sign-On URL - SSO URL

    • X.509 Certificate - Certificate

    ec-saml-okta-provider.png
  14. This app must be assigned to users:

    Ensure that you configure the desired assignments.

    ec-saml-okta-assign.png
Did this answer your question?