SUPPORT

Contact Support

OPEN A TICKET

Configuring Okta Single Sign-On Integration with SAML

Okta is an identity and access management platform. Its single sign-on solution allows users to log into a variety of systems using one centralized process.

  • Using Security Assertion Markup Language (SAML), a user can use their managed account credentials to sign in to enterprise cloud applications via Single Sign-On (SSO). An Identity Provider (IdP) service provides administrators with a single place to manage all users and cloud applications. 
  • You don't have to manage individual user IDs and passwords tied to individual cloud applications for each of your users. An IdP service provides your users with a unified sign-on across all their enterprise cloud applications. Netsparker Enterprise supports the SAML methods of both IdP initiated and SP initiated.
  • You can also create a new user in Netsparker Enterprise using the Enable Auto Provisioning option.

If you encounter any problem while setting up SSO integration, see Troubleshooting SSO Issues.

You have to use IdP-initiated SSO if you want to utilize Auto Provisioning.
If you will use SP-initiated SSO, please set the Name ID Format value to email address on the IdP side.

Single Sign-On Fields

This table lists and explains the Single Sign-On fields in the Configure Single Sign-On window.

Field Description
Enable Select this option to enable the single sign-on feature.
Enforce to authenticate only with single sign-on Enable this option so only administrator users can authenticate without single sign-on. Users can only sign in to Netsparker Enterprise by using the email address that belongs to their employer.
IdP Identifier This is the SAML identity provider’s Identifier value.
SAML 2.0 Service URL This is the Consumer URL value (also called the SSO Endpoint or Recipient URL).
SAML 2.0 Endpoint This is the URL from your IdP's SSO Endpoint field.
X.509 Certificate This is the X.509 certificate value.

How to Configure Okta Single Sign-On Integration with SAML

  1. Log in to your Okta account and navigate to the Admin dashboard.
  2. From the main menu, go to Applications > Add Application > Create New App.
  3. In the Create a New Application Integration dialog, configure the connection details:
    • From the Platform section, select Web.
    • From the Sign on method section, select SAML 2.0.
    • Select Create.
  1. From the Create SAML Integration window, enter a name to the App name field.

  1. Log in to Netsparker Enterprise, and from the main menu, select Settings > Single Sign-On
    • Copy the URL from the SAML 2.0 Service URL field.
    • Then in Okta, paste the URL into the Single sign on URL field.
    • In Netsparker Enterprise's Single Sign-On window, copy the URL from the Identifier field.
    • In Okta paste the URL into the Audience URI (SP Entity ID) field.
    • If you selected Enable Auto Provisioning, for user creation in Netsparker Enterprise you should complete the FirstName, LastName, and Phone Number (optional) fields in the Attribute Statements. If you did not select it, you do not need to complete anything.
  1. In Okta, select Next. The Feedback tab is displayed.
  2. Select Finish, and ensure that you assign your users.
  3. Navigate to the Applications window and select the Sign On tab. 
  4. Select Assignments if you want to assign either a User or Groups.

  1. Select Assign, then Assign to People or Assign to Groups.
  2. In the Sign On tab, select View Setup Instructions.

  1. In the window that is displayed:
    • Copy the URL from the Identity Provider Issuer field.
    • Then log in to Netsparker Enterprise, and from the main menu, click Settings, then Single Sign-On. The Single Sign-On window is displayed. Select Okta from the drop-down list and paste the URL into the Idp Identifier field.
    • Next, copy the URL from the Identity Provider Single Sign-On URL field.
    • Then in Netsparker Enterprise's Single Sign-On window, paste the URL into the SAML 2.0 Endpoint field.
    • Copy the content from the X.509 Certificate field.
    • Finally, in Netsparker Enterprise's Single Sign-On window, paste it into the X.509 Certificate field.
  1. On Netsparker Enterprise's Single Sign-On page, select one or all of the following options, if necessary:
    • Enable Auto Provisioning: If enabled, an account will be automatically created for IdP-registered users when they first access Netsparker Enterprise. To do so, you must complete the FirstName, LastName, and Phone Number (optional) fields in the Attribute Statements on the IdP side.
    • Require SAML assertions to be encryptedIf enabled, it prevents third parties from reading private data in transit from assertions.  There are two options:
      • Generate a new certificate for me: Netsparker generates a key pair. Netsparker will keep a private key to decrypt received SAML messages and provide you with a certificate so that you can upload it on the IdP side.
      • I have an existing certificate: You need to upload your certificate to Netsparker by importing a decryption certificate from your files.
    • Use Alternate Login Email: If enabled, this lets users use alternative email for SSO. So, you can enter an alternative email on the New Member Invitation page and while editing the user's details on the Team page.
  1. Select Save Changes.
Netsparker

Highly accurate, fast & easy-to-use Web Application Security Scanner

Get a demo