Configuring Single Sign-On (SSO)

Note:The following information is unique to the single sign-on vendor Okta (SAML 2.0). Single sign-on procedures from other vendors may vary.

To set up Okta (SAML 2.0) to use as a single sign-on (SSO) with Software Vulnerability Research:

1. Sign in to Okta.
2. Create an admin account.
3. Click Create New App to create a new Okta SSO app.

4. Choose Web for the Platform and SAML 2.0 for the Sign on method. Then click Create.

5. Enter an App name (Example: SVM) and App logo (Example: see Software Vulnerability Research logo below). Then click Next.

6. Copy the following from the Software Vulnerability Research Settings > User Management > Single Sign On fields and paste in the Okta SAML Settings > fields:
Single Sign On URL (Same with Recipient URL and Destination URL) to Single sign on URL and Audience URL (SP Entity ID)
Account Key to accountKey Value

Complete the remaining Okta SAML Settings > Attribute Statements (Optional) name and value fields using the field’s drop-down list:

firstName
lastName
email
username

7. Click (if not already selected) I’m an Okta customer adding an internal app for the Create SAML Integration - Step 3 Feedback screen. You can leave the rest of the fields blank.

8. At the Okta Sign On Settings screen, click the Identity Provider metadata link.

9. Copy the Identity Provider metadata URL from Okta into the Software Vulnerability Research Settings > User Management > Single Sign On > IDP Metadata URL field. Check SSO Enabled, check Automatically create new users, and assign a Default group for new users.

Note:For a secure connection, the Assertions Signed (or similarly named) setting should be enabled on your IDP.

10. If you want to disable standard login options for all of your users (except root), select the Disable standard login option under Settings > User Management > SSO Settings > Service Provider Configuration.
11. Click Save to on the Settings > User Management page.

Important:Before selecting this option, make sure that SSO is working correctly, to prevent user lockout.

12. Add Software Vulnerability Research users to the Okta SSO account.

13. Assign Software Vulnerability Research users to the Okta SSO app. A reset password link is sent to each user.

14. Users open the reset password link, reset their password, and click open the Okta SSO application.

15. Users are then logged into the Software Vulnerability Research Login page.

Important:For security purposes, Software Vulnerability Research has a session timeout that will log you off after 2 hours of inactivity.