Okta Workforce OnPrem (SAML)
This guide will walk you through the steps required to configure Okta Workforce as a Single Sign-On (SSO) provider in On Premise deployment of Observo using SAML 2.0.
Prerequisites
An active Okta Workspace account.
A running Observo On Premise deployment.
Admin access to both Okta and Observo.
Steps to Set Up Okta as a SAML Identity Provider in Observo
1. Create a SAML Application in Okta
You need to create a SAML application in Okta to enable On Premise Observo to authenticate users via SAML.
Log into Okta as an admin.
Go to Applications > Applications in the Okta dashboard.
Click on Create App Integration.
Select SAML 2.0 as the Sign-in method. Click Next.
Fill out the General Settings:
App name: Provide a name for the application (e.g.,
Observo SAML).Click Next.
2. Configure SAML Settings (Initial Setup)
For now, enter temporary values. We'll update these after configuring Keycloak.
In the SAML Settings section:
Single sign on URL:
https://<ObservoOnPremURL>/observo-auth/realms/master/broker/okta-saml/endpointAudience URI (SP Entity ID):
https://<ObservoOnPremURL>/observo-auth/realms/masterDefault RelayState: Leave blank
Name ID format: EmailAddress
Application username: Email
Under Attribute Statements (optional), add:
Name:
email, Name format: Basic, Value:user.emailName:
firstName, Name format: Basic, Value:user.firstNameName:
lastName, Name format: Basic, Value:user.lastName
Under Group Attribute Statements (optional, for role mapping):
Name:
groups, Name format: Basic, Filter: Matches regex.*
Click Next, then select I'm an Okta customer adding an internal app.
Click Finish to create the application.
3. Retrieve SAML Entity Descriptor
Retrieve the SAML entity descriptor URL that will be used in Observo configuration.
In the application you just created, go to the Sign On tab.
In the SAML Setup section, locate the Metadata URL (SAML entity descriptor).
Copy this URL.
4. Configure Observo to Use Okta as a SAML Identity Provider
Now, configure Okta as a SAML Identity Provider in Observo keycloak.
Log into Observo keycloak with Observo Admin users credential. Observo keycloak is hosted in this URL:
https://<ObservoOnPremURL>/observo-authSelect the realm of your Observo deployment to configure Okta SSO.
masteris the default realm.In the left-hand menu, click Identity Providers.
From the Add provider dropdown, select SAML v2.0.
Fill in the following details:
Alias:
okta-samlDisplay name: (Optional) The name that users will see on the login screen (e.g., "Okta")
Import from URL: Paste the SAML entity descriptor URL from step 3.
Click Import.
Click Save.
5. Configure Attribute Mappers
Create mappers to import user attributes from Okta into Observo.
Log into keycloak and go to the okta-saml identity provider you just created.
Click on the Mappers tab.
Create the following mappers by clicking Add mapper → Attribute Importer:
Email Mapper:
Name:
EmailSync Mode Override:
ImportAttribute Name:
emailAttribute Name Format:
BasicUser Attribute Name:
email
First Name Mapper:
Name:
First NameSync Mode Override:
ImportAttribute Name:
firstNameAttribute Name Format:
BasicUser Attribute Name:
firstName
Last Name Mapper:
Name:
Last NameSync Mode Override:
ImportAttribute Name:
lastNameAttribute Name Format:
BasicUser Attribute Name:
lastName
User Name Mapper:
Name:
User NameSync Mode Override:
ImportAttribute Name:
emailAttribute Name Format:
BasicUser Attribute Name:
username
Click Save for each mapper.
6. Assign Users to the Application in Okta
Users must be assigned to the Okta application to use SSO.
In Okta, go to Applications > Applications and select your Observo SAML app.
Go to the Assignments tab.
Click Assign and select Assign to People or Assign to Groups.
Assign the appropriate users or groups and click Done.
7. Create SSO Object in Observo
Observo UI needs to know about the domains name for which it will use SSO.
Log in Observo UI and go to Settings > SSO
Configure SSO of type SAML and provide the required details
In the Domain Aliases section, provide email domains that will use SSO.
Next page, Configure Role Mapping (Optional)
Default User Role: Default role for those users with no explicit role assigned
Field Path:
realm_access.rolesRole Mapping: Map the roles you created in keycloak with Observo roles.
8. Add Role Mapper (Optional)
For using role mapping with Okta groups, follow these steps:
Go to Realm roles in keycloak and create the roles you want to use.
In the okta-saml identity provider, go to Mappers tab.
Click Add mapper → Advanced Role:
Name:
Groups Role MapperSync Mode Override:
ForceMapper type:
SAML Attribute to RoleAttribute Name:
groupsAttribute Value: Enter the exact Okta group name you want to map (e.g.,
Observo-Admins)Role: Select the keycloak realm role to assign. If you don't find the role you created, try using Filter by realm roles.
Repeat this step for each group-to-role mapping you need.
9. Test the Integration
Once the configuration is complete, test the Okta SAML integration.
Access Observo UI.
Select the Okta SSO option on the login page.
Log in with your Okta credentials.
After successful authentication, you should be redirected back to Observo UI and logged in.
By following these steps, you should have Okta Workforce successfully integrated with Observo On Premise deployment using SAML 2.0.
Last updated
Was this helpful?

