Universal Policy Administrator Documentation
Configuring SAML authentication with Okta
- Install the UPA Gatekeeper and Gateway
- Create and configure UPA as an enterprise application in your Okta tenant:
- In the Okta console, go to Applications:
- Select Create App Integration
- Select SAML 2.0 as the authentication type
- Enter a name for your application
- Click Next
- Configure SAML settings as follows:
- Enter the Single sign-on URL https://<gatekeeper>/Portal/SSO/SamlACS
- Select the Recipient URL and Destination URL check boxes
- Enter the Audience URI https://<gatekeeper>
- Enter a domain name for UPA, to use with Microsoft Entra ID users and groups, as the Default Relay State. For example, ‘Entra’ or ‘MyDomain’
- Enter an email address as the NameIDFormat
- Enter your Okta username as the Application Username
- Enter the application username in the Create and Update fields
- Download the HAPI certificate from the Gatekeeper machine in the location C:\Program Files\Full Armor\UPA\Gatekeeper\nginx\conf\certificate.crt
- Go to Advanced Options and upload the HAPI certificate
- Select the Allow application to initiate single logout checkbox where the Single Logout URL is https://<gatekeeper>/Portal/SSO/SLO
- Assign users and groups in the Okta console:
- On your application’s Overview page, select Assign users and groups from the Identity menu or the Getting Started area
- Select Add user /group on the Users and groups page
- On the Users and groups tab of the Add Assignment page, select one or more Users and Groups check boxes
- Click Select
- Click Assign
- Set up single sign-on:
- Configure your application to use SAML authentication:
- Download the HAPI SAML metadata:
- In the OpenText UPA Owner Portal (https://<gatekeeper>/portal/account), select SSO
- Click Get SAML Metadata
- Save to a file. For example, C:\UPA\Metadata\GetOktaMetatadata.xml
- In the Okta console, browse to your application’s Overview page:
- Select Single sign-on
- On the Single sign-on page, select SAML
- On the SAML- based Sign-on page, select Upload metadata file and upload the HAPI SAML metadata
- On the Basic SAML Configuration tab, enter a domain name for UPA under Relay State (Optional), to use with Microsoft Entra ID users and groups. For example, ‘Entra’ or ‘MyDomain’
- Enter the Sign on URL (Optional) (https:///Portal/SSO/SamlLogin?provider=) where Provider Name is the name of the SAML provider for UPA, specified in the previous step
- In the SAML Certificates area, select Download Federation Metadata XML
- Save to a file. For example, C:\UPA\Metadata\OktaSAMLFederationMetatadata.xml
- Download the HAPI SAML metadata:
- Configure your application to use SAML authentication:
- In the Okta console, go to Applications:
- Configure UPA to use SAML authentication:
- In the Full Armor UPA Owner Portal, go to the SSO tab
- Click Add SAML Provider to launch the SAML Configuration Settings page and complete the following steps:
- Enter the Provider Name to match the value in Relay State (Optional) in a previous step
- Select the default Tenancy ID
- Select the Set as Default Login Provider check box for the UPA web console to use this SAML provider as the default identity provider for logins
- (Optional) To login with a non-default SAML provider, go to https://<gatekeeper>/Portal/SSO/SamlLogin?provider=<ProviderName>
- In the Name ID Format list, click EmailAddress
- In the Signature Algorithm list, click SHA_256
- In the Provisioning Mode list, click AutomaticProvisioning
- Click Save
- Set up SCIM provisioning:
- In the Full Armor UPA Owner Portal, go to the SSO tab
- On the Manage Authentication page, click Edit for the given SAML provider
- On the SAML Configuration Settings page, click Configure Provisioning
- On the Provisioning Settings page, click Get SCIM Token
- In the Okta console, go to the UPA application
- Select the Enable SCIM Provisioning checkbox
- On the Provisioning /Integration tab, complete following provisioning actions:
- Enter the SCIM Connector Base URL: https://<gatekeeper>/api/scim in the given format
- Enter the username Unique Identifier field for Users
- Choose Push New Users
- Choose Push Profile Updates
- Choose Push Groups
- In the Authentication Mode list, click HTTP Header
- Enter the the SCIM token from a previous step
- Browse to Provisioning > To App > Attribute Mappings and remove the following mappings:
- Manager
- ValueEmployee
- Number
- Cost Center
- Organization
- Division
- Department
- Manager
- Display Name
- Click Save Changes
- Click Force Sync
- Assign a UPA Global Administrator role:
- On the UPA Owner Portal, click the SSO tab when provisioning is complete
- Select the List Users button for the given SAML provider
- Confirm that the users/ groups are imported correctly
- Select the user to grant global administrator permissions
- Click Set User as Global Admin
- In the Full Armor UPA Owner Portal, go to the SSO tab
