Add Okta as an identity provider
Use Okta to give your organization users single sign-on (SSO) access to Aiven using SAML. Aiven also supports user provisioning for Okta with SCIM.
Supported features
- Identity provider (IdP) initiated SSO
- Service provider (SP) initiated SSO
For more information on the listed features, visit the Okta Glossary.
Step 1: Add the IdP in the Aiven Console
- In the organization, click Admin.
- Click Identity providers.
- Click Add identity provider.
- Select an identity provider and enter a name.
- Select a verified domain to link this IdP to. Users see linked IdPs on the login page.
On the Configuration step are two parameters that you use to set up the SAML authentication in your IdP:
- Metadata URL
- ACS URL
Step 2: Configure SAML on Okta
- In the Okta administrator console, go to Applications > Applications.
- Click Browse App Catalog.
- Search for and open the Aiven app.
- Click Add Integration and Done.
- On the Sign On tab, click Edit.
- In the Advanced Sign-on Settings set the Metadata URL and ACS URL to the URLs copied from the Aiven Console.
- Set the Default Relay State for the console you use:
- For the Aiven Console: https://console.aiven.io
- For the Aiven GCP Marketplace Console: https://console.gcp.aiven.io/
- For the Aiven AWS Marketplace Console: https://console.aws.aiven.io/
- Click Save.
- In the SAML 2.0 section, click More details.
- Copy the Sign on URL, Issuer, and the Signing Certificate. You'll use these to configure the IdP in Aiven.
Step 3: Finish the configuration in Aiven
Go back to the Aiven Console to complete setting up the IdP. If you saved your IdP as a draft, you can open the settings by clicking the name of the IdP.
- In the IDP URL field, enter the Sign on URL from Okta.
- In the Entity ID field, enter the Issuer from Okta.
-
Paste the certificate from the IdP into the Certificate field.
-
Optional: Paste or upload a JSON file with configuration details for your IdP.
-
Click Next.
-
Configure the security options for this IdP and click Next.
-
Require authentication context: This lets the IdP enforce stricter security measures to help prevent unauthorized access, such as requiring multi-factor authentication.
-
Require assertion to be signed: The IdP checks for a digital signature. This security measure ensures the integrity and authenticity of the assertions by verifying that they were issued by a trusted party and have not been tampered with.
-
Sign authorization request sent to IdP: A digital signature is added to the request to verify its authenticity and integrity.
-
Extend active sessions: This resets the session duration every time the token is used.
-
Enable group syncing: This syncs the group membership from your IdP to the Aiven Platform.
note- The Aiven Platform doesn't create groups with this feature. It only syncs the group membership between the groups in your IdP and the groups you create in Aiven. For user group provisioning, use SCIM.
- User group membership automatically syncs when a user logs in.
- The IdP is the single source of truth. If a group in the IdP doesn't exist in Aiven, it will be ignored. Likewise, if a user is added to a group in Aiven Console but not in the IdP, they will be removed from the Aiven group when the group membership syncs.
-
-
Optional: Select a user group to add all users who sign up with this IdP to.
-
Click Finish to complete the setup.
If you set up a SAML authentication method before and are now switching to a new IdP, existing users need to log in with the new account link URL to finish the setup.
Step 4: Optional: Configure user provisioning
You can automate user provisioning with Okta through System for Cross-domain Identity Management (SCIM). This means you can manage your users and their profiles in one place, Okta, and push those changes to the Aiven platform.
Aiven's integration with Okta supports these features:
- Push new users: Users created in Okta are automatically created as managed users in Aiven.
- Push profile updates: User profile updates in Okta are pushed to Aiven. Profiles for these users cannot be changed in Aiven.
- Push user deactivation: Users that are deactivated or removed in Okta are deactivated in Aiven. You can manually delete users in Aiven after they are deactivated.
- Push groups: Groups created or updated in Okta are created and updated in Aiven.
- Sync passwords: Automatically synchronizes users' Aiven passwords with their Okta passwords.
To configure user provisioning for Okta:
- In Okta, click Applications and go to the Aiven application.
- Click Provisioning.
- Click Settings > Integration > Configure API Integration.
- Select Enable API Integration.
- In the API Token field, paste the Access token from the Aiven Console.
- Click Test API Credentials to confirm the connection is working
and save the configuration.
important
Don't enable Import Groups. Aiven groups that aren't managed by SCIM cannot be imported to Okta.
- Click Sign On.
- In the Credentials Details section, for the Application username format select Email.
- Click Save.
Troubleshooting
Authentication failed
When launching the Aiven SAML application, you get the following error:
Authentication Failed
Login failed. Please contact your account administrator for more details.
Ensure IdP initiated login is enabled.
Invalid relay state
If you get the invalid relay state error, then you are attempting an IdP-initiated auth flow. This happens, for example, when you click the Aiven SAML app in Okta. Set the Default Relay State in Okta to the Aiven console that your organization uses.
The Okta password does not work
Make sure to use the Account Link URL to add the Okta IdP to your Aiven user account. You can view all authentication methods in User information > Authentication.