Okta SSO
SureMDM's seamless integration with Okta Single Sign-On (SSO) provides your organization with a streamlined and secure authentication experience. With Okta SSO, you can leverage a centralized identity management solution that enhances user convenience and bolsters data protection. Users can access SureMDM and other connected applications using a single set of login credentials. This eliminates the need to remember multiple passwords and simplifies the login process.
Configure settings in Okta server
To configure settings on the Okta server, follow these steps:
1. Login to Okta Server and click Admin.
2. Click Add Applications > Create New App.
3. Select SAML 2.0 and click Create.
4. Enter the App Name as SureMDM.
5. Click Next and navigate to SAML Settings, enter the following details:
- Entity ID: urn:42gears:suremdm:SAML2ServiceProvider
- Single sign on URL: https://(SureMDM Hub ServerPath)/adminconsole/ssoconsumer/Hub ID
Admin should enter their SureMDM Server Path and Hub ID into the above-mentioned URL.
6. Click Next.
7. Select the first option I'm an Okta customer adding an internal app and click Finish.
8. Click View Setup instructions.
9. Download the certificate and copy SAML Metadata from View Setup Instructions link.
A certificate will be downloaded.
Configure settings in SureMDM Hub (Okta)
To configure SSO with Okta, follow these steps:
1. Login to the SureMDM Hub as a Superuser.
2. Navigate to SureMDM Hub > Account Management > Single Sign On
3. Configure Single Sign-On settings for Okta.
- Enable Single Sign-On: Select this option to allow configuring Single Sign-On settings.
- Service Identifier: Enter the Service Identifier. This value is present in Setup instructions tab, i.e., Identity provider issuer, see step no.10, Configure settings in Okta server. For example: http://www.okta.com/exk2kuyba0rCTZQOC1t7
- Sign On Service Url: Enter the Sign On Service Url. This value is present in Setup instructions tab, i.e., Identity Provider Single Sign-On URL, see step no.10, Configure settings in Okta server. For example: https://42gears123.okta.com/app/42gears1_suremdm_1/exk2kuyba0rCTZQOC1t7/sso/saml
- Roles: Choose an option for the Roles from the drop-down menu. To know more, see Create Roles for the Admin User.
4. Click Generate Certificate to generate a self-signed certificate on the server and make it ready for download.
or
Click Upload Certificate to upload another certificate.
These options are available when no certificate is uploaded.
5. Once configured, click Save.