Configuring Single Sign-On (SSO)

Note:The following information is unique to the single sign-on vendor Okta (SAML 2.0). Single sign-on procedures from other vendors may vary.

To set up Okta (SAML 2.0) to use as a single sign-on (SSO) with Software Vulnerability Research:

1. Sign in to Okta.
2. Create an admin account.
3. Click Create App Integration to create a new Okta SSO app.
4. Choose SAML 2.0 for the Sign on method. Then click Next.
5. Enter an App name (Example: SVM) and App logo (Example: see Software Vulnerability Research logo below). Then click Next.
6. Copy the following from the Software Vulnerability Research Settings > User Management > Single Sign On fields and paste in the SAML Settings > fields:
Single Sign On URL (Same with Recipient URL and Destination URL) to Single sign on URL and Audience URL (SP Entity ID)
Account Key to accountKey Value (in Attribute Statements (Optional)
7. In the Create SAML Integration - Step 3 Feedback screen, click Finish.
8. At the Okta Sign On Settings screen, click on Copy link to copy the metadata URL.
9. Copy the Identity Provider metadata URL from Okta into the Software Vulnerability Research Settings > User Management > Single Sign On > IDP Configuration Instructions section. In the Service Provider Configuration section, check SSO Enabled, check Automatically create new users, and assign a Default group for new users by selecting from the drop down.

Note:For a secure connection, the Assertions Signed (or similarly named) setting should be enabled on your IDP.

10. If you want to disable standard login options for all of your users (except root), select the Disable standard login (Ensure SSO is working first, to prevent lockout.) option under Settings > User Management > SSO Settings > Service Provider Configuration.
11. Click Save to on the Settings > User Management page.

Important:Before selecting this option, make sure that SSO is working correctly, to prevent user lockout.

12. Add Software Vulnerability Research users to the Okta SSO account.
13. Assign Software Vulnerability Research users to the Okta SSO app. A reset password link is sent to each user.
14. Users open the reset password link, reset their password, and click open the Okta SSO application.
15. Users are then logged into the Software Vulnerability Research Login page.

Important:For security purposes, Software Vulnerability Research has a session timeout that will log you off after 2 hours of inactivity.