Asset Intelligence and Management

AssetSonar Blogs Enable Okta Sso Da89c7d6a848

[How-to] Enable Okta SSO Using SAML 2.0 In AssetSonar

Enable Okta SSO Using SAML 2.0 In AssetSonar

AssetSonar offers multiple login options such as Google, Microsoft, LDAP, or SAML so your employees can sign in to the application without having to remember separate credentials for AssetSonar. You can select your preferred login options including SAML from Settings → Company Settings → Authentication → SAML → Update.

Enable Okta SSO Using SAML 2.0 In AssetSonar

With SAML Single Sign-on as a login option, you can eliminate the use of passwords, centralize access control, and prevent illegal or unnecessary access from former employees.

This blog details how you can enable SAML SSO in your AssetSonar account using Okta as an Identity Provider.

Let’s get started!

Contents

  1. Adding the AssetSonar application in Okta
  2. Configuring SAML 2.0 in AssetSonar
    2.1. Whitelisting the IPs on SAML
    2.2. Filling in the configuration settings
  3. Assigning the AssetSonar application to users in Okta
  4. Login experience
  5. Provision users to a custom role

1. Adding the AssetSonar application in Okta

To enable Okta SSO for AssetSonar, you must first add the AssetSonar application to your Okta account.

For this purpose, log in to your Okta account. Go to Applications and click on the ‘Add Application’ button.

Adding the AssetSonar application in Okta 1

This directs you to the Okta marketplace. Here, search for ‘AssetSonar’ and add the application as shown.

Adding the AssetSonar application in Okta 3

Adding the AssetSonar application in Okta 4

Configure details such as Application Label and Subdomain, and hit ‘Done’.

Adding the AssetSonar application in Okta 5

Note: Make sure that you enter the correct value in the Subdomain field under the General tab in Okta. Using the wrong value will prevent you from authenticating via SAML to AssetSonar.

The application is now added to your Okta account.

Adding the AssetSonar application in Okta 7

Note: Okta SSO is not ready to use until you have configured SAML 2.0 in AssetSonar.

2. Configuring SAML 2.0 in AssetSonar

2.1. View setup instructions in Okta

To configure SAML, navigate to the Sign On tab of your AssetSonar application in Okta and click on ‘View Setup Instructions’.

Configuring SAML 2.0 in AssetSonar 7

Here, you can find all the key parameters you need to configure SAML 2.0 in AssetSonar. These include the Identity Provider URL and Identity Provider Certificate.

Configuring SAML 2.0 in AssetSonar 5

2.2. Fill configuration settings in AssetSonar

Now, traverse to your AssetSonar account. Go to Settings → Add Ons → SAML Integration, and select ‘Enabled’.

Fill configuration settings in AssetSonar 1

This reveals additional settings as illustrated.

Fill configuration settings in AssetSonar 2

Configure these data fields using the information provided below:

  1. Identity Provider URL: Copy and paste the Identity Provider URL from Section 2.1.
  2. Identity Provider Certificate: Copy and paste the Identity Provider Certificate from Section 2.1.
  3. Login Button Text: Type your preferred text e.g. ‘Log in via Okta SSO’.
  4. Clock Drift (seconds): Enter your preferred value e.g. 1.
  5. First Name: Enter ‘first_name’.
  6. Last Name: Enter ‘last_name’.
  7. Email: Type ‘email’.
  8. AssetSonar Role By default: Select your preferred option.

Click ‘Update’ once you’re done.

This is how the AssetSonar login page should look like once SAML 2.0 has been configured in AssetSonar.

Fill configuration settings in AssetSonar 3

3. Assigning the AssetSonar application to users in Okta

Next, you must assign the AssetSonar application to users that you want to give the SAML SSO login authorization.

In your Okta account, go to Applications → AssetSonar → Assignments tab → Assign → Assign to People.

Select the users you want to assign AssetSonar to and click on the ‘Assign’ button next to their name. Hit ‘Done’.

Fill configuration settings in AssetSonar 4

You can see that Sunny Gardner has now been assigned to AssetSonar in Okta.

Fill configuration settings in AssetSonar 5

Sunny Gardner is now authorized to log into AssetSonar using Okta SSO.

4. Login experience

Once Okta SSO has been set up, the following takes place when you try to log in to a SAML-enabled AssetSonar account:

– You see the ‘Log in via Okta SSO’ button on the AssetSonar login page.

Fill configuration settings in AssetSonar 6

– Clicking on the ‘Log in via Okta SSO’ button takes you to the Okta login page for authentication.

– If you are already signed in to Okta, you’ll directly land onto the AssetSonar portal. As illustrated, Sunny Gardner (the user you previously assigned in Okta) has logged into AssetSonar.

Fill configuration settings in AssetSonar 7

– The email addresses of users determine which AssetSonar members they are.

– Users who aren’t added to an AssetSonar account under the Members tab, but access that AssetSonar account for the first time via SAML, are added as new Staff Users.

Note: If you want your employees to use Okta SSO as the only authentication option in AssetSonar, you can disable other options from Settings → Company Settings → Authentication.

5. Provision users to a custom role

If you want to provision your employees and their respective roles in a way that their hierarchy is reflected in AssetSonar, you can do so by selecting a Default Role that your users will get imported into AssetSonar as.

To enable this setting, go to Settings → Add Ons → SAML Integration from your AssetSonar account. Select your preferred custom role as a Default Role into which you want to provision a certain set of employees.

Let’s say, you want to import a set of Hardware Technicians from Okta into AssetSonar. Select the following option and hit ‘Update’.

Fill configuration settings in AssetSonar 8

AssetSonar also supports SAML SSO for the following IdPs:

Read more: [How-to] Implement User Provisioning via SCIM with AssetSonar and Okta

About AssetSonar

AssetSonar is a powerful IT asset management solution used by IT-intensive organizations and businesses all over the globe. Sign up today for a free 15-day trial.

For more assistance, drop us an email at support@ezo.io. You can also visit our blog for detailed support posts.

Join the Conversation: Twitter | Facebook

Was this helpful?

Thanks for your feedback!