Configure Single Sign-On (SSO)
Note • The following information is unique to the single sign-on vendor Okta (SAML 2.0). Single sign-on procedures from other vendors may vary.
Setting up Okta (SAML 2.0) to use as a single sign-on (SSO) with Software Vulnerability Research
|
2.
|
Create an admin account. |
|
3.
|
Click Create New App to create a new Okta SSO app. |
|
4.
|
Choose Web for the Platform and SAML 2.0 for the Sign on method. Then click Create. |
|
5.
|
Enter an App name (Example: SVM) and App logo (Example: see Software Vulnerability Research logo below). Then click Next. |
|
6.
|
Copy the following from the Software Vulnerability Research Settings > User Management > Single Sign On fields and paste in the Okta SAML Settings > fields: |
|
•
|
Single Sign On URL (Same with Recipient URL and Destination URL) to Single sign on URL and Audience URL (SP Entity ID) |
|
•
|
Account Key to accountKey Value |
Complete the remaining Okta SAML Settings > Attribute Statements (Optional) name and value fields using the field’s drop-down list:
|
7.
|
Click (if not already selected) I’m an Okta customer adding an internal app for the Create SAML Integration - Step 3 Feedback screen. You can leave the rest of the fields blank. |
|
8.
|
At the Okta Sign On Settings screen, click the Identity Provider metadata link. |
|
9.
|
Copy the Identity Provider metadata URL from Okta into the Software Vulnerability Research Settings > User Management > Single Sign On > IDP Metadata URL field. Check SSO Enabled, check Automatically create new users, and assign a Default group for new users. Click Save. |
Note • For a secure connection, the Assertions Signed (or similarily named) setting should be enabled on your IDP.
|
10.
|
Add Software Vulnerability Research users to the Okta SSO account. |
|
11.
|
Assign Software Vulnerability Research users to the Okta SSO app. A reset password link is sent to each user. |
|
12.
|
Users open the reset password link, reset their password, and click open the Okta SSO application. |
|
13.
|
Users are then logged into the Software Vulnerability Research Login page. |
Important • For security purposes, Software Vulnerability Research has a session timeout that will log you off after 2 hours of inactivity.
Software Vulnerability Research
Current
Open topic with navigation