You can setup Single Sign-On for Remote through certain Identity providers (IdPs). To do this with Okta:
- On the New App Integration wizard, select
SAML 2.0
. - Set a name.
- Add the
Single sign on URL
andAudience URI
. These will be different for each customer and will include company slugs. Examples:- Single sign on URL:
https://[AUTH0_TENANT].us.auth0.com/login/callback?connection=[COMPANY_SLUG]-sso
- Audience URI:
urn:auth0:[AUTH0_TENANT]:[COMPANY_SLUG]-sso
- Single sign on URL:
- Define the Attribute Statements. Okta says this is optional, but we need customers to set this up to get access to users name and email when they authenticate on Remote to find their account and (maybe) sync their name:
- Okta specific: Mark the App Integration as internal
- The App Integration was created and we need to retrieve some data to finish the setup on Remote. Scrolling down, customers can find the View SAML setup instructions link.
- On the setup instructions page, they can retrieve the Identity Provider Single Sign-On URL and X.509 Certificate . They will need to input this data on Remote to finish the setup.
- Okta specific: Assign users/groups that can use the app, otherwise they won’t be able to get authenticated through it.
Comments
0 comments
Article is closed for comments.