How to setup Yotascale SSO with Okta using Okta OpenID
Currently Yotascale provides support for Google Auth, SAML or Okta OpenID authentication, with a limitation of only 1 Authentication Provider at any given point in time. This guide focuses on setting up Okta as your IdP using Yotascale's Okta OpenID authentication provider.
Yotascale - Retrieve SAML auth data:
- Login to Yotascale with a user that has Admin role access
- In top right hand corner select the round circle with your initials
- Select Manager Users
- Select Manage Auth Provider tab
- Select "+ New Auth"
- From Auth Provider drop down select Okta OpenID
- Enter an Organization name
- At bottom of page copy and save the following links:
- Redirect/ACS URL:
- https://app-api.yotascale.io/login/organization/sesandbox/auth/okta-openid/authorized
- Initiate Login URI:
- https://app.yotascale.io/login.html/external_provider?org_name=sesandbox
Okta - Create Application
- Login to Okta
- Select Application Tab
- Select "Create New App"
- From Platform dropdown select "Web"
- For Sign on Method, Yotascale support either one of the following methods:
- SAML 2.0
- OpenID Connect
- For this guide select OpenID Connect
- Select "Create"
- Enter App name
- Yotascale-<method>
- Add App logo if required
- Configure OpenID connect
- Select "Add URI" for Login Redirect URIs.
- Enter the saved data for Redirect/ACS URL from Yotascale
- Select "Save"
- Client Credentials
- Copy and save the Client ID
- Copy and save the Client secret
- General Settings
- Copy and save the Okta domain
- Select "Edit" for General Settings
- Replace the Initiate login URI with copied Initiate Login URI from Yotascale.
- Select Save
Yotascale - Complete Okta OpenID Auth Provider configuration
- You should still be logged in and on the SAML Auth Provider configuration page
- If not, login again to Yotascale with a user that has Admin role access
- Follow the same steps to add new SAML Auth provider as describe above.
- Make sure to add the same Organization name for SAML
- Enter the following information:
- Organization name already entered
- Client ID
- Enter the Client ID that was copy for the Okta application
- Client Secret
- Enter the Client Secret that was copy for the Okta application
- Okta Domain URL
- Enter the Okta domain that was copy for the Okta application
- https:// <Okta domain>
- Auto Provisioning
- Enabled - When user authenticates through Okta, the user account will automatically be created in Yotascale User list.
- Disabled - User accounts first needs to be manually created in Yotascale.
- Default Provision Role
- Admin/Power User/Tag Admin/User
- Select Create New Auth
- In order to verify the Auth provider, a user account needs to be created manually in Yotascale that matches the user that has permissions to the Yotascale application in Okta.
- Under Manage Users tab, select User List
- Select "+ New User"
- Enter the First Name
- Enter the Last Name
- Enter the email address that matches the email address of the user that has permissions to the Okta applications.
- Select Applicable role based on your requirements
- Admin/Power User/Tag Admin/User
- Select "Yotascale" from dropdown for Auth.
- Select "Create User"
- Under Manage Users tab, select the Manage Auth Provider tab
- For the SAML Auth Provider select "Verify auth Provider"
- This will open the Okta login page
- Login with same user account that has access to the Okta Application and created manually in Yotascale.
- The successful login should verify the Auth Provider.
- Under Manage Users tab, select User List
- Under the manually created user, select the Auth dropdown and change from Yotascale to the SAML Auth provider name.
- Select "Save Changes"
- Configuration is now complete and users should be able to login via Okta successfully.
- If you run into any issues, please contact our support team.