Configure Okta using OAuth2 & Open ID

<< Click to Display Table of Contents >>

Navigation:  Manage platform users and authentication > Manage identity providers for Enterprise subscriptions > Single Sign On Setup > Cloud portals Authentication with OAuth2 & Open ID >

Configure Okta using OAuth2 & Open ID

Overview

To integrate your Customer Portal and Bizagi's cloud-baed services with your corporate Okta you need to carry out the configuration steps as described in this section. Note that these are done only once, typically by an admin user of your Customer Portal having access to your Okta.

 

Once you have carried out these steps users sign in to any cloud-based service directly via your Okta, as described at Signing in the Bizagi Cloud Portals and Applications.

 

Before you start

The Customer Portal and cloud-based services support Okta using the OAuth2 & Open ID protocol.

 

note_pin

The only identity provider supported by OAuth2 & Open ID is Okta

 

Additionally you need:

 

To have already users into the Customer Portal

When integrating any Identity Manager, you need to register authorized accounts so they can access Bizagi 's cloud-based portals.

Register means providing or updating the account's primary identifiers. The Bizagi's account email must match with the email registered in your Okta. Usually, email is the most common parameter. See Create company users.

 

Bizagi does not store passwords when integrating an Identity Manager.

 

note_pin

You cannot have two or more users with the same email, because it is considered as part of the primary identifier.

 

Once you have verified in the Customer Portal that there has been at least an initial import of your users into Bizagi, you may proceed.

 

What you need to do

An outline describing the configuration needed to sign in with Okta considers these steps:

1.Register an Bizagi as an authorized application in Okta

2.Configure Okta in the Customer Portal

 

Configuration

Follow the steps presented to integrate your Okta after you've created the company users:

 

1. Register an authorized application.

This step is done directly at your Okta portal. Sign in to your Okta portal as administrator. Click the Applications tab, and click the Add Application button.

 

CP_Okta_1

 

Create a New App.

 

CP_Okta_2

 

Select OpenID Connect.

 

CP_Okta_3

 

Register the Login and logout redirect.

 

Login URI: https://accounts-[your_company].bizagi.com/auth/openid/bridge/callback

Logout URI: https://accounts-[your_company].bizagi.com/postlogout.html

 

CP_Okta_4

Select the Authorization grant type as Authorization Code. Make sure that you save the Client ID and Client Secret.

 

CP_Okta_5

 

You can associated your Okta application with users or groups. To control who has access to the Customer Portal.

 

CP_Okta_6

 

note_pin

Bizagi considers the following priority in the assertions:

1. UPN

2. Email

 

Both UPN and Email Address must be in email format:  [name]@[provider].[domain]. For example john.smith@mycompany.com.

 

Make sure that the user is registered as a company user and is added to a subscription.

 

2. Configure Okta in the Customer Portal

To configure Okta as your Identity Provider, you need to access the Customer Portal as a company administrator, select the Settings Icon, open the Protocols menu, and click Add authenticator.

 

customerportal_117

 

Select the OAuth2 & Open ID connect option in the protocol drop-down list, and configure these settings:

Display name: name of the authenticator displayed in the Customer Portal.

Description: Brief description of the authenticator.

URL: Your Okta application URL.

Client ID: Client ID obtained in the general settings of the Okta application configuration.

Client Secret: Client Secret obtained in the general settings of the Okta application configuration.

 

customerportal_133

 

Define the domains

If you need to activate multiple authenticators, you can define the email domains associated with each authenticator. See Multiple authenticators for cloud-based portals.

 

Finally, you need to activate the authenticator. Before activating the new authenticator, review carefully your configuration settings. Bizagi displays a warning message when activating the protocol.

 

customerportal_134

 

To test your configuration we recommend that all users log out and opening a new tab using incognito mode, or use a different browser. If the configuration with a new IdP fails, you can restore the authentication protocol.


Last Updated 7/17/2023 4:43:42 PM