The integration has two steps, one on the OKTA side and one on the Datarails side.
Step 1 - Datarails
Enforce Login Authorization Method
Admins can define the login authorization method for their organization.
- From the Home page, navigate to the left-side panel and click on Admin
- From there, click on Organizations
- In the new page that opens, find your organization (there may be only one) and click on the three dots ellipsis.
- Then from the dropdown choose, Enforce Auth Method For Admins
- Select the option necessary for your organization.
- Click Save.
- Click on the three dots on the right of the organization, and select Edit SAML Configurations:
- Enter the information from the OKTA site in the following screen:
Name: okta
IDP SSO URL: Sign into the Okta Admin Dashboard to generate this variable.
IDP Issue (entityID): Sign into the Okta Admin Dashboard to generate this variable.
Certificate: Sign into the Okta Admin Dashboard to generate this variable.(without the --- begin/end certificate --- parts)
Click Save.
To get the information, please follow step 2 of the setup
Step 2 - OKTA
You can choose one of the following methods:
- Use the DataRails public app (recommended).
- Or create a custom datarails app.
Public app
Go to the Okta Administrator Dashboard to add the public DataRails application, then view the specific values for your organization. You will need to save these values for step 2.
Use classic UI admin, go to the DataRails application-> Sign on -> view setup instructions.
Custom app
If you want to create a custom app and not use the public app, you can configure it with the following params:
Single Sign On URL
https://app.datarails.com/oktasso/?acs
Recipient URL
https://app.datarails.com/oktasso/?acs
Destination URL
https://app.datarails.com/oktasso/?acs
Audience Restriction
https://app.datarails.com/oktasso/metadata
Default Relay State
Name ID Format
EmailAddress
Response
Signed
Assertion Signature
Signed
Signature Algorithm
RSA_SHA256
Digest Algorithm
SHA256
Assertion Encryption
Unencrypted
SAML Single Logout
Disabled
authnContextClassRef
PasswordProtectedTransport
Honor Force Authentication
Yes
SAML Issuer ID
http://www.okta.com/${org.externalKey}
ATTRIBUTE STATEMENTS
Name Name Format Value
Email Unspecified user.email
Username Unspecified user.username
firstName Unspecified user.firstName
lastName Unspecified user.lastName
© Datarails Ltd. All rights reserved.
Updated
Comments
0 comments
Article is closed for comments.