Configuring SSO for Okta

This article explains how to setup SSO with Uptime.com as the Service Provider, and Okta as the Identity Provider. Users can utilize an organization’s Okta Sign-In Page or the WAYFless URL provided by Uptime.com to authenticate with Uptime.com for all account privileges. 

SSO eliminates or dramatically reduces the need for multiple logins, as individuals maintain a single sign-on.  

Okta and Uptime.com have the following requirements before you can complete setup:

  • On the Okta Side: Administrator access to the Okta account to manage applications and permissions.
  • On the Uptime.com Side: An Uptime account with administrator access to configure SAML SSO, which is plan dependent

These instructions assume you are an administrator logged into both Uptime.com and Okta. 

Table of Contents

Step One: Create New App in Okta

Return

Login to your organization’s Okta account admin panel, then click Applications. Click Add Application, and then Create New App. Select Web as the Platform, and SAML 2.0 as the Sign On Method. Okta will ask you to name this integration, and you can also upload a graphic to represent the logo or icon.

After you have named your integration, click Next

Copy the Single Sign On URL (ACS URL) from Uptime.com and paste it into the Single Sign On URL field. 

Step Two: Fill SSO Details into Okta

Return

This step will require you to have Uptime.com and Okta open simultaneously. 

Paste the Requisite URLs into Okta

SSO-step1.png

SSO implementation with Okta will require users to copy and paste the following from Uptime.com to Okta:

  • ACS URL/SSO URL
  • EntityID/Audience URI

Lastly, download the Okta Certificate to paste the values into Uptime.com. 

Changing Attributes and Values

Uptime.com requires the following attributes to be set to successfully authenticate the user:

  • A unique user identifier or email address: Name ID  /  Subject NameID
  • The user's email, one of: Email  /  User.Email  /  E-Mail Address  /  eduPersonPrincipalName
  • The user's first name, one of: FirstName  /  User.FirstName  /  Given Name  /  givenName
  • The user's last name, one of: LastName  /  User.LastName  /  Surname  /  sn

Scroll to the Attribute Statements and input the values as seen below:

okta.png 

 

When this is complete, you are ready to move onto Uptime.com. ​

Step Three: Paste in the SSO Login Details and Certificate of Your IdP

Return

sso-step2.png

Return to Uptime.com to complete Okta SSO setup.

Uptime.com, requires the EntityID you received fromOkta. Additionally, you must supply the URL that triggers the SSO login with your IdP.

The final steps in your SSO configuration are to paste the contents of the X509 certificate downloaded in step 2 into Uptime.com.

Please ensure this certificate is in PEM format.

Testing SSO Implementation

Return

It’s important to confirm SSO implementation is working through Okta, or to receive feedback on the specific error that is causing an issue for your SSO implementation. The fastest way to test this method is with the WAYFless URL provided by Uptime.com.

You can also test from your Okta domain. Simply click on the application you created, which should successfully log your user account into the Uptime.com dashboard. 

When using Okta as an SSO provider, users are automatically created on login with "View Only" permissions. An Uptime.com account administrator can adjust permissions in the Uptime account after the use has been created.

Note any error messages you receive and use the corresponding support articles to troubleshoot the issue:

Was this article helpful?
0 out of 1 found this helpful

Comments

0 comments

Article is closed for comments.

Have more questions?
Submit a request
Share it, if you like it.