# SSO for OKTA

This article explains how to configure Single Sign-On (SSO) in AutoRABIT with Okta as your **SAML 2.0** Identity Provider. When SSO is enabled, by default users and groups logging into AutoRABIT are redirected to the Okta login page. After successful authentication, they are redirected to the AutoRABIT Dashboard.

### Add AutoRABIT Application to Okta <a href="#add-autorabit-application-to-okta" id="add-autorabit-application-to-okta"></a>

First, configure Okta to provide the sign-on information for the AutoRABIT environment.

To add the AutoRABIT application to Okta:

1. Sign in to Okta. You must have the Applications **Admin** permission.
2. If you don’t have an Okta organization, you can create a free Okta Developer Edition organization here: <https://developer.okta.com/signup/>
3. Navigate to the **Admin** dashboard.

<figure><img src="https://1912836914-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F9vAxMuDrkUkB4OXlH9CL%2Fuploads%2Fni5s07ykwd5IudomH8c2%2Fimage.png?alt=media&#x26;token=a4ebeba6-0c7b-4864-936f-8bc30ac0dc72" alt=""><figcaption></figcaption></figure>

4. From the main menu, go to **Applications > Applications.**

<figure><img src="https://1912836914-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F9vAxMuDrkUkB4OXlH9CL%2Fuploads%2FtQYhHcEWPJV0cCxcalWC%2Fimage.png?alt=media&#x26;token=7fe7931e-a821-4193-99e4-8c0ea97f440e" alt="" width="185"><figcaption></figcaption></figure>

5. Click on **Create App Integration.**

<figure><img src="https://1912836914-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F9vAxMuDrkUkB4OXlH9CL%2Fuploads%2Fn5m7AsHBlgamAG8N3S7H%2Fimage.png?alt=media&#x26;token=7d969cdc-3e52-4608-bd22-9c861b6a176f" alt="" width="518"><figcaption></figcaption></figure>

6. In the next auto-populated dialog box, select the second option i.e., **SAML 2.0,** and click on **Next**.

<figure><img src="https://1912836914-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F9vAxMuDrkUkB4OXlH9CL%2Fuploads%2F9Y6uaH6iO5N9tdSNUk2P%2Fimage.png?alt=media&#x26;token=6ae92419-cc33-4880-9490-d7944f5ca1dc" alt="" width="563"><figcaption></figcaption></figure>

7. In the **General Settings**, enter **"AutoRABIT"** in the **App name** field, upload the **AutoRABIT logo** and click on the **Next** button.

<figure><img src="https://1912836914-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F9vAxMuDrkUkB4OXlH9CL%2Fuploads%2F1yek84gcO0DQVddAk6Sr%2Fimage.png?alt=media&#x26;token=d807dc51-cdb1-4167-91ef-56829464857f" alt="" width="373"><figcaption></figcaption></figure>

8. In the **Configure SAML** tab, do the following:

   * **Single sign on URL:** Enter the URL in the following format: **\<instanceURL>/saml/SSO**. For example, if your instance is **<https://pilot.autorabit.com/>**, then the payload URL would be: ***<https://pilot.autorabit.com/saml/SSO>***
   * **Audience URI (SP Entity ID)**: Enter the URL in the following format: **\<instanceURL>/saml/metadata**

   <figure><img src="https://1912836914-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F9vAxMuDrkUkB4OXlH9CL%2Fuploads%2F870mbaaPIK7kx5lQMFAR%2Fimage.png?alt=media&#x26;token=3c520d08-99c7-41f5-9165-c58e20982620" alt="" width="371"><figcaption></figcaption></figure>
9. On the same screen, in the **Attribute Statements (optional)** panel, configure the following:

| Name  | Value      |
| ----- | ---------- |
| Email | user.email |

<figure><img src="https://1912836914-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F9vAxMuDrkUkB4OXlH9CL%2Fuploads%2FtKRjztaOeJHTeCAxDEiR%2Fimage.png?alt=media&#x26;token=8344cf7d-771b-470f-978b-4416c45d2b9c" alt="" width="549"><figcaption></figcaption></figure>

10. Click **Next** to continue.
11. Under **the Feedback** section, select the option: **I'm an Okta customer adding an internal app** and click the checkbox next to the text **"This is an internal application that we created"**, and click on the **Finish** button.

<figure><img src="https://1912836914-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F9vAxMuDrkUkB4OXlH9CL%2Fuploads%2FlTNPwtrdLW5DvjkFW962%2Fimage.png?alt=media&#x26;token=96c8b56d-358b-4259-b328-69f4b1ece0e4" alt="" width="549"><figcaption></figcaption></figure>

12. Navigate your mouse to the **Assignment** tab, click **Assign > Assign to People.**

<figure><img src="https://1912836914-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F9vAxMuDrkUkB4OXlH9CL%2Fuploads%2FpAFxtvHEiz6Rb7QlwLQG%2Fimage.png?alt=media&#x26;token=adf8ee90-5f01-47f1-95e3-8d6f60328b01" alt="" width="563"><figcaption></figcaption></figure>

13. Next, select the listed **users** and click on **Assign**.

<figure><img src="https://1912836914-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F9vAxMuDrkUkB4OXlH9CL%2Fuploads%2FAWCrDNzy40ytgSVs77mh%2Fimage.png?alt=media&#x26;token=e21e3d82-8912-4522-a0fb-6e94ad1e3ec4" alt="" width="511"><figcaption></figcaption></figure>

14. After you assign the user, click on **Save and Go Back** and then click  **Done**.

<figure><img src="https://1912836914-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F9vAxMuDrkUkB4OXlH9CL%2Fuploads%2FKHHrUOhnC6l1jlIre3Y6%2Fimage.png?alt=media&#x26;token=34bfbc24-a750-4f66-a831-653c18941f8e" alt="" width="525"><figcaption></figcaption></figure>

<figure><img src="https://1912836914-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F9vAxMuDrkUkB4OXlH9CL%2Fuploads%2Fv14y8KhrPmG5rnxnaass%2Fimage.png?alt=media&#x26;token=05d1b664-b578-4d2b-b139-065ef65de3a5" alt="" width="433"><figcaption></figcaption></figure>

15. Go to the **Sign On** tab and click on **Identity Provider Metadata.**

<figure><img src="https://1912836914-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F9vAxMuDrkUkB4OXlH9CL%2Fuploads%2F4nmVYRK2EHcip6UIp71F%2Fimage.png?alt=media&#x26;token=ab6d285c-6000-4e4f-a0f6-6e98e42f4957" alt="" width="369"><figcaption></figcaption></figure>

16. This will open up a new tab with some data. You must save this data in XML format on your own system. When you press **CTRL + S**, the data is downloaded in XML format.&#x20;

<figure><img src="https://1912836914-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F9vAxMuDrkUkB4OXlH9CL%2Fuploads%2FFqOR04HSmIRUC1xYbyab%2Fimage.png?alt=media&#x26;token=8e4cb9c9-7469-4419-a876-31b1a3d02f4a" alt="" width="563"><figcaption></figcaption></figure>

17. You can also use the Identity Provider metadata URL link and use it to configure SSO with AutoRABIT instead of downloading the metadata XML file. To do so, right-click on the **Identity Provider metadata** and choose the **Copy link address** from the list.

<figure><img src="https://1912836914-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F9vAxMuDrkUkB4OXlH9CL%2Fuploads%2FIvzfppvXbebujtnmG9jJ%2Fimage.png?alt=media&#x26;token=ef02091b-2550-4572-aae6-cc9ab38d23c8" alt="" width="497"><figcaption></figcaption></figure>

<figure><img src="https://1912836914-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F9vAxMuDrkUkB4OXlH9CL%2Fuploads%2FdwLz5bTX0ksXgLh6Hv5x%2Fimage.png?alt=media&#x26;token=6b00c716-a6dd-48f5-ad05-3a4577d4f715" alt="" width="563"><figcaption></figcaption></figure>

18. Now, log in into your AutoRABIT account.
19. Hover your mouse over the **Admin** module and select the option: **My Account**
20. On the **My Account** page, go to the 3rd section: **SSO Configuration**
21. Browse for the metadata XML file that you have downloaded previously to your local machine and upload them.

<figure><img src="https://1912836914-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F9vAxMuDrkUkB4OXlH9CL%2Fuploads%2FmQ8M2fzW9TP8AJ2xbOBl%2Fimage.png?alt=media&#x26;token=f9ddfcac-87a9-4d71-b219-95977768a275" alt="" width="563"><figcaption></figcaption></figure>

22. SML configuration for OKTA is successfully configured in AutoRABIT. Now, the user can log in to AutoRABIT using OKTA. To do so, first sign out from your current AutoRABIT account.
23. On your login screen, click on the **Single Sign On** button.

<figure><img src="https://1912836914-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F9vAxMuDrkUkB4OXlH9CL%2Fuploads%2FkHTzjloINNIAxiB5EGP4%2Fimage.png?alt=media&#x26;token=fd27b7f5-f344-460e-854d-1166bd07936c" alt="" width="563"><figcaption></figcaption></figure>

24. Enter your company's domain name. Click **Go**.

<figure><img src="https://1912836914-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F9vAxMuDrkUkB4OXlH9CL%2Fuploads%2F0qmWhGb9gHlGQ35udYeF%2Fimage.png?alt=media&#x26;token=9aa9c2ba-93e0-4543-9c4e-fc064af96d3a" alt="" width="563"><figcaption></figcaption></figure>

25. This concludes SSO configuration with AutoRABIT. You can now log in to AutoRABIT from your Okta dashboard page directly.

<figure><img src="https://1912836914-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F9vAxMuDrkUkB4OXlH9CL%2Fuploads%2FH3zod2rJzGdQjcn1rKoy%2Fimage.png?alt=media&#x26;token=703abc63-9e45-447a-8f35-2797cf19d3ce" alt="" width="488"><figcaption></figcaption></figure>
