Okta SSO guide

This article explains how to configure Okta to enable Single Sign On in Cydarm

To enable users to authenticate using Okta, we must first go to the Okta administration console and configure an application.

Step 1: Access applications section

  1. Navigate to the Applications section in your Okta admin console
  2. Click Create App Integration
    okta_step1

Step 2: Select sign-in method

  1. In the Create a new app integration dialog, select SAML 2.0 as your sign-in method
  2. SAML 2.0 is described as XML-based open standard for SSO. Use if the Identity Provider for your application only supports SAML.
Click Next
okta_step2

Step 3: Configure general settings

  1. App name: Enter Cydarm (or your preferred name)
  2. App logo (optional): Upload the Cydarm logo if desired
  3. App visibility: Leave unchecked unless you want to hide the application icon from users
Click Next
okta_step3

Step 4: Configure SAML settings

In the SAML Settings section, configure the following:

General settings:

  • Single sign-on URL: Eg. https://staging.cydarm.com:443/cydarm-api/auth/saml
    • ⚠️ Note that inclusion of the :443 is important!
    • ✅ Check Use this for Recipient URL and Destination URL
  • Audience URI (SP Entity ID): Enter okta-sso (or a unique identifier)
    • ⚠️ Make sure to record this value!
  • Default RelayState: Leave blank (optional)
  • Name ID format: Select Unspecified from dropdown
  • Application username: Select Email from dropdown
Update application username on: Select Create and update from dropdown
okta_step4-1

Attribute statements (optional):

Configure user attributes to be passed to Cydarm (this step is useful for the option of auto-provisioning accounts):

  • FirstName
    • Name format: Unspecified
    • Value: user.firstName
  • LastName
    • Name format: Unspecified
    • Value: user.lastName
okta_step5

Click Add Another to add additional attributes as needed.

Step 5: Complete integration setup

  1. After completing the SAML configuration, you'll see the application created successfully
  2. The application will show as Active in your Applications list
  3. Note the Metadata URL which will be displayed in the Sign On tab

okta_step6-1

Step 6: Configure Cydarm

    • If you are a hosted customer: Log a support ticket with the metadata URL and Audience URI
    • If you are an Enterprise customer (on premise): Follow the SAML SSO Configuration guide

    Step 7: Assign users to the application

    1. Go to the Assignments tab of your Okta administration console
    2. Click Assign and choose:
      • Assign to People: To assign individual users
      • Assign to Groups: To assign entire groups
    3. Search for and select the users or groups that need access to Cydarm
    4. Click Assign to complete the assignment

    The interface will show assigned users and groups, and you can filter by People or Groups using the dropdown menu.

    okta_step7

    Verification

    Once configured:

    • Users assigned to the Cydarm application will see it in their Okta dashboard
    • From the Cydarm application, clicking SSO Login will cause the user to be automatically signed in via SAML SSO

    Troubleshooting

    • Ensure the Single sign-on URL exactly matches your Cydarm instance URL with the correct port (443)
    • Verify that the Audience URI matches what is configured in Cydarm
    • Check that users are properly assigned to the application
    • Review the metadata URL is correctly provided to your Cydarm administrator


    For more detailed technical information please refer to our Cydarm API documentation.