Comment on page
SSO for OKTA
This article explains how to configure Single Sign-On (SSO) in VAULT with Okta as your SAML 2.0 Identity Provider. When SSO is enabled, by default users and groups logging into VAULT are redirected to the Okta login page. After successful authentication, they are redirected to the VAULT Dashboard.
To add the VAULT application to Okta:
- 1.Sign in to Okta. You must have the Applications Admin permission.
- 3.The home page will appear when you log in to Okta.
- 4.From the main menu, go to Applications > Add Application.
- 5.Click on the Create App Integration button.
- 6.In the next auto-populated dialog box, select the second option i.e., SAML 2.0, and click on the Next button.
- 7.In the General Settings, enter "VAULT" in the App name field, upload the VAULT logo and click on the Next button.
- 8.In the Configure SAML tab,
- 1.Single sign on URL: Enter the URL in the following format: <instanceURL>/ARVault/saml/SSO. For example, if your instance is https://vault-qa.autorabit.com, then the payload URL would be: https://vault-qa.autorabit.com/ARVault/saml/SSO
- 2.Audience URI (SP Entity ID): Enter the URL in the following format: <instanceURL>/ARVault/saml/metadata
- 9.On the same screen, in the Attribute Statements (optional) panel, configure the following:
- 10.Click Next to continue.
- 11.Under the Feedback section, select the option: "I'm an Okta customer adding an internal app" and "This is an internal application that we created", and click on the Finish button.
- 12.Navigate your mouse to the Assignment tab, and click Assign > Assign to People.
- 13.Next, select the listed users and click on Assign. After you assign the user click "Save and Go Back" and then click Done.
- 14.Here, you can see the assignment status.
- 15.Go to the Sign On tab and click on Identity Provider Metadata.
- 16.This will open up a new tab with some data. You must save this data in XML format on your own system. When you press CTRL + S, the data is downloaded in XML format.
- 17.You can also use the Identity Provider metadata URL link and use it to configure SSO with Vault instead of downloading the metadata XML file. To do so, right-click on the Identity Provider metadata and choose the Copy link address from the list.
- 18.Now, login into your VAULT account.
- 19.Hover your mouse over the Setting, go to the SSO Configuration section.
- 20.Give a name for the SSO configuration and select how you would like to configure the metadata
- 1.For Metadata URL, you need to enter the URL link that you captured earlier (Refer to Step 17)
- 2.For Metadata File, browse for the metadata XML file you saved on your local machine and upload it. Click Activate.
- 21.SML configuration for OKTA is successfully configured in VAULT. Now, the user can log in to VAULT using SSO.Disable Login with Vault credentialsTurn the slide toggle to the left to use SSO for login to your Vault application instead of the default username and password. This will allow you to access your Vault account via SSO.
- 22.On your login screen, click Login with SSO.
- 23.Enter your Customer ID. You'll find your Customer ID under the Profile section in your Vault account.
- 23.Finally, click on Sign in.
- 23.This concludes SSO configuration with the Vault.
- 24.Go to your OKTA dashboard page and click on the Vault icon to access the account.
Vault throws the following error when a user tries to log into Vault via SSO: "Your user is not available in the account with provided customer id. Please contact the administrator to create a user for you in the account"
The error usually occurs if:
- 1.The user details are not assigned inside OKTA to login into the Vault application.
- 2.The administrator has set the restrictAutoCreationOfUser to Yes inside Attribute Statements while configuring OKTA SSO. If it is set to Yes, the user is not permitted access to Vault if the account is not created in Vault.