Fortinet black logo

Cookbook

Configuring the Okta developer account IDP application

Copy Link
Copy Doc ID 53d09085-7746-11e9-81a4-00505692583a:332274
Download PDF

Configuring the Okta developer account IDP application

  1. Open a browser, log in to your Okta developer account, and select Admin under your user settings.
  2. Go to the Applications tab and select Add Application.
  3. Select Create New App and create a new application with the SAML 2.0 sign on method.
  4. Enter a custom App name and select Next (upload an App logo if you wish).
  5. Note that the name entered here is the name of the portal the user will log into.

  6. Under A – SAML Settings, set Single sign on URL and Audience URI (SP Entity ID) to the ACS and Entity URLs (respectively) from the Edit SAML Portal Settings page on the FortiAuthenticator.
  7. Users will be required to provide their email address as their username, and their first and last names (as seen in the example).

    Before continuing, make sure to select Download Okta Certificate. This will be imported to the FortiAuthenticator later. You do not need to configure group attributes or section B below.

  8. In the last step, confirm that you are an Okta customer, and set the App type to an internal app. Then select Finish.
  9. Once created, open the Sign On tab and download the Identity Provider metadata.
  10. Finally, open the Assignments tab and select Assign > Assign to People.
  11. Assign the users you wish to add to the application. This will permit the user to log in to the application’s portal. Save your changes and select Done.

    The user is successfully assigned. This concludes the steps necessary in configuring SAML 2.0.

Configuring the Okta developer account IDP application

  1. Open a browser, log in to your Okta developer account, and select Admin under your user settings.
  2. Go to the Applications tab and select Add Application.
  3. Select Create New App and create a new application with the SAML 2.0 sign on method.
  4. Enter a custom App name and select Next (upload an App logo if you wish).
  5. Note that the name entered here is the name of the portal the user will log into.

  6. Under A – SAML Settings, set Single sign on URL and Audience URI (SP Entity ID) to the ACS and Entity URLs (respectively) from the Edit SAML Portal Settings page on the FortiAuthenticator.
  7. Users will be required to provide their email address as their username, and their first and last names (as seen in the example).

    Before continuing, make sure to select Download Okta Certificate. This will be imported to the FortiAuthenticator later. You do not need to configure group attributes or section B below.

  8. In the last step, confirm that you are an Okta customer, and set the App type to an internal app. Then select Finish.
  9. Once created, open the Sign On tab and download the Identity Provider metadata.
  10. Finally, open the Assignments tab and select Assign > Assign to People.
  11. Assign the users you wish to add to the application. This will permit the user to log in to the application’s portal. Save your changes and select Done.

    The user is successfully assigned. This concludes the steps necessary in configuring SAML 2.0.