This article explains how to setup SSO with Uptime.com as the Service Provider, and Okta as the Identity Provider. Users can utilize an organization’s Okta Sign-In Page or the WAYFless URL provided by Uptime.com to authenticate with Uptime.com for all account privileges.
SSO eliminates or dramatically reduces the need for multiple logins, as individuals maintain a single sign-on.
Okta and Uptime.com have the following requirements before you can complete setup:
- On the Okta Side: Administrator access to the Okta account to manage applications and permissions.
- On the Uptime.com Side: An Uptime account with administrator access to configure SAML SSO, which is plan dependent.
These instructions assume you are an administrator logged into both Uptime.com and Okta.
Step One: Create New App in Okta
Login to your organization’s Okta account admin panel, then click Applications. Click Add Application, and then Create New App. Select SAML 2.0 as the Sign On Method. Okta will ask you to name this integration, and you can also upload a graphic to represent the logo or icon.
After you have named your integration, click Next.
Copy the Single Sign On URL (ACS URL) from Uptime.com and paste it into the Single Sign On URL field.
Step Two: Fill SSO Details into Okta
This step will require you to have Uptime.com and Okta open simultaneously.
Paste the Requisite URLs into Okta
SSO implementation with Okta will require users to copy and paste the following from Uptime.com to Okta:
- ACS URL/SSO URL
- EntityID/Audience URI
Lastly, download the Okta Certificate to paste the values into Uptime.com.
Changing Attributes and Values
Uptime.com requires the following attributes to be set to successfully authenticate the user:
- A unique user identifier or email address: Name ID / Subject NameID
- The user's email, one of: Email / User.Email / E-Mail Address / eduPersonPrincipalName
- The user's first name, one of: FirstName / User.FirstName / Given Name / givenName
- The user's last name, one of: LastName / User.LastName / Surname / sn
Be sure to scroll to the Attribute Statements and copy and paste the values.
When this is complete, you are ready to move onto Uptime.com.
Step Three: Paste in the SSO Login Details and Certificate of Your IdP
Return to Uptime.com to complete Okta SSO setup.
Uptime.com, requires the EntityID you received fromOkta. Additionally, you must supply the URL that triggers the SSO login with your IdP.
The final steps in your SSO configuration are to paste the contents of the X509 certificate downloaded in step 2 into Uptime.com.
Please ensure this certificate is in PEM format.
Testing SSO Implementation
It’s important to confirm SSO implementation is working through Okta, or to receive feedback on the specific error that is causing an issue for your SSO implementation. The fastest way to test this method is with the WAYFless URL provided by Uptime.com.
You can also test from your Okta domain. Simply click on the application you created, which should successfully log your user account into the Uptime.com dashboard.
Note any error messages you receive and use the corresponding support articles to troubleshoot the issue:
- SAML Assertion was not Signed
- SAML Assertion missing Username
- Incorrect SAML Issuer
- Missing Subject Name or ID
- SSO Login Form Not Working