Configuring SSO for LabCollector with Okta - LabCollector

Search Knowledge Base by Keyword

Configuring SSO for LabCollector with Okta

You are here:
← All Topics

 

This Knowledge Base article provides step-by-step instructions to set up Single Sign-On (SSO) using SAML authentication between LabCollector and Okta.

Read our KB on how to configure LabCollector SSO page.

Note

Single Sign On Authentication: This allows your lab to use SAML (Security Assertion Markup Language) authentication for signing in. SAML provides a single point of authentication, which happens at a secure identity provider. SAML uses secure tokens which are digitally signed and encrypted messages with authentication and authorization data. These tokens are passed from an identity provider to LabCollector with an established trust relationship. As in the case of LDAP, passwords (except for that of the super administrator) are managed outside of LabCollector.

Tips

To integrate a custom Single Sign-On (SSO) provider, you must include their domain in the restriction asset list using the format *.domain.ext (as demonstrated in the screenshot below). Here are the detailed steps to add your SSO provider:

  1. Log in to your LabCollector instance with administrative privileges.
  2. Navigate to the Admin section.
  3. Select “Setup” from the menu.
  4. Click on “Security options”
  5. Add the SSO provider’s domain under “Asset domains” in the format *.domain.ext followed by login.microsoftonline.com

 

Prerequisites:

Admin Access: You need administrative access to both your Okta and LabCollector accounts.

 

1. Create the SAML App in Okta

  • On the left-hand menu, click ApplicationsApplications. This brings up your existing integrations list.
  • At the top left, press the Create App Integration button (blue).

 

  • Select SAML 2.0 under Sign-in method

  • Click Next

 

  • App name: e.g., “LabCollector SSO”

  • App logo (optional): Upload your LabCollector logo so end users see it on their Okta dashboard

  • Click Next

2. Configure SAML Settings

  • Single sign-on URL: https://<YOUR_INSTANCE>/login.php?acs

  • Audience URI (SP Entity ID): https://<YOUR_INSTANCE>/login.php?metadata

 

3. Retrieve Okta IdP Metadata

  • From Applications → Applications, click LabCollector SSO (or whatever you named it)

  • Select the Sign On tab

  • Click Identity Provider metadata to download the XML, or click View SAML setup instructions.

 

 

4. Exchange Information

Copy and paste the following information from Okta to the LabCollector SSO page:
– SSO Okta URL to LabCollector EntityID.
– IDP URL to LabCollector Single Sign-On Service.
– IDP URL to LabCollector Single Logout Service.
– Copy IDP Certificate from Okta and paste it into the Identity Provider Public Key section.

 

5. Create Users in LabCollector

– Create or import user accounts in LabCollector ensuring that the same identifier is used in both systems (as defined in Step 3.3).

By following these steps, you can successfully configure SSO authentication for LabCollector with Okta, enabling users to access LabCollector easily using their Okta credentials.

 

Additional Considerations
  • User Provisioning: Ensure that user accounts exist in both Okta and LabCollector for seamless SSO authentication.
  • Testing and Troubleshooting: Perform thorough testing of the SSO setup and address any issues or errors encountered during the configuration process.

    Related topics: