Okta

as a SAML2.0 identity provider

This allows you to use Okta for SAML 2.0 log-in.

Step1. Create a new Application in Okta.

    • If you are using the Developer dashboard, you first need to switch to the Classic UI.
      okta-developer-console
    • Log in to your Okta organization as a user with administrative privileges.
    • Go to Applications and click Add Application.
      okta-add-application-active
    • In the next screen click on the Create New App button.
      okta-create-new-app
    • In the modal that shows up next, select Web for Platform and SAML 2.0 for Sign on method.
      okta-new-sign-on
    • In Step 1 - General Settings, type in the preferred name for your app and click Next.
      okta-general-settings
    • In Step 2 - Configure SAML, fill in the form as follows:
        • FirstName mapped to user.firstName
        • LastName mapped to user.lastName
        • Email mapped to user.email

saml-general-settings-attribute

    • In Step 3 - Feedback, select I’m an Okta customer adding an internal app and check This in an internal app that we created.
    • Finish the process and navigate to the Sign on tab. Click on View Setup Instructions.
      okta-sign-on-methods
    • A new tab will open containing the Okta settings that will be configured in YArooms. Leave this open.
      okta-how-to-configure-saml

 

Step 2. Configure the SAML Connection in YArooms
Login to your YArooms domain as an administrator. Navigate to Integrations -> SAML 2.0 Authentication and start the integration process. In the Connection tab, fill in the form as follows:

    • Identity Provider: Type Okta (this is a label, any value is accepted, it will appear on the login page as "Authenticate with Okta")
    • Issuer URL: Copy and paste the value for Identity Provider Issuer from the Okta Setup Instructions tab.
    • SAML Endpoint: Copy and paste the value for Identity Provider Single Sign-On URL from Okta.
    • X.509 Certificate: Copy and paste the entire string for the X.509 Certificate from Okta.
    • Name ID Format: unspecified
    • Attributes Mapping:
      • Map First Name to FirstName
      • Map Last Name to LastName
      • Map Email Address to Email.

            okta-attributes-mapping

 

The string values present in the IDP Field Name column must match those created in Okta at Step 2 - Configure SAML.

Save options and navigate to User options tab. Set default group and location for the new users created with data from the Identity Provider.

okta-user-options

Save User options and navigate to Application details tab.

Click on the activation button under Application details tab and complete the integration process.

 

Note: PProper user provisioning and assignment in Okta are not topics covered by this tutorial which assumes you already know how to configure Okta options that are specific to how your organisation sets up its users. The assignment of access for users to the newly configured YArooms app is one of these topics.

x

Cookies

YArooms uses cookies, a vital component of the web without which this website would not function. Find out more in our Privacy Policy.

x
room-booking-system-signup-image

Trying YArooms doesn't cost you
a dime, but
overlapping bookings might

Give it a shot!