Skip to main content

SAML with OKTA

SAMLThe following example assumes your Knocknoc instance is alocated complicatedat topic,https://demo.knoc.cloud. withWherever manyyou variables,see sothat, please takesubstitute it for your own instance URL.

Setting Up the timeIdP

to

Create read through the documentation and check all the settings are correct.

First we need a newan Application

in
    Okta:
  1. Click Create App Integration,Integration
  2. and then select
  3. Select SAML 2.0
  4. Set an App name,name. EG(e.g Knocknoc
    Knocknoc)
  5. Optional: Upload a logologo.
  6. if
  7. Click youNext.
  8. like:

  9. Click

    image.png

    OK
  10. Then Next
    OK

  11. Enter the Single sign-on URL is:(e.g https://demo.knoc.cloud/api/saml/acsacs)
  12. and leave
  13. Leave Use this for Recipient URL and Destination URL ticked

    ticked.
  14. The

  15. Enter the Audience URL (SP Entity ID)ID is:URL e.g https://demo.knoc.cloud/api/saml/metadatametadata)

  16. Leave Default Relay State blankc

    blank
  17. Set Name ID Format :as Persistent

  18. Set Application user:user as Okta Username

  19. Click Show advanced Settings

    settings
  20. Upload your own certificatecertificate, one can be created like so:

    On your own PC or similar:
    Makeon a newLinux certmachine andusing key:the following command.

    openssl req -new -x509 -days 3650 -nodes -subj /CN=Knocknoc/ -out user-demo-knoc-cloud.crt -keyout user-demo-knoc-cloud.key


  21. Leave other options default

  22. Add

    an Attribute statements

    statement with the following settings

image.pngimage.png

SAML Signing Certificates

In

    SAML signing certificates, delete
  1. Delete the original onecertificate, thereit (itsis probablylikely SHA1 andwhere yourthe newnewly generated one is SHA2).

    SHA2
  2. You then need to

  3. View the IDP metadata,metadata and save it

     as an XML file.

Knocknoc SettingsAssignments

Upload

  1. Assign the saved IDP metadataApplication to your users.
  2. Enable the option to send Groups, to allow the users to be automatically assigned to the correct ACLs.

Knocknoc asSAML SAMLMetadataFile

Config

Set

  1. Login In the Knocknoc admin interface.
  2. Click on Settings on the left.
  3. Under Public URL toenter youryou Knocknocknocknoc instanceurl. URLNote: (withoutdo thenot add a / at the end!)

    end

    Setof the SAMLMetadataURLURL.

  4. to
  5. For the SAMLMetaDataFile, upload the xml file you downloaded from EntraID.
  6. For the SAMLCertFile, upload the certificate (.crt) file you created in during the SAML Configuration.
  7. For the SAMLKeyFile, upload the key (.key) file you created in during the SAML Configuration.
  8. For the SAMLMetadataUrl, paste the Metadata DetailsDetails, Metadata URL from the Okta control panelpanel.
    Upload
  9. your
  10. Click certificateSave.
  11. and key you made earlier.

    Assignments

    You also need to assign the Application to your users, and make sure you send Groups, so the Groups can map to Knocknoc groups and have ACLs assigned to them.