Search here...
< All Topics

Prolaborate and OKTA SAML Integration

Prerequisites

Your Prolaborate site should have a valid SSL Certificate.

If you don’t have an SSL Certificate, you can create a self-signed certificate yourself. Please get in touch with the Prolaborate team to know more about it.

Service Provider Configuration

To configure the Service Provider, click on Menu → SAML Settings.

From the top of the page that opens, click on Enable SSO.

Name Name will be prefilled
Assertion Consumer URL Assertion Consumer URL will be Prefilled
Certificate File Choose the .pfx file of your SSL certificate
Certificate Password Enter the Password of the .pfx file

Configuring Prolaborate in Okta

The following sections will elaborate on the steps involved in setting up Prolaborate in Okta.

Create a new SAML Application

To create a SAML application, follow the below steps:

Log in to your Okta account as a user with administrative privileges. Click on the Admin button.

Click on the Applications tab.

Click on Create App Integration button

Select the Sign-in method as SAML 2.0 and click on the Next button.

General settings

In step 1, fill General settings as per the instructions below and click on Next.

App name Enter your Application Name (say Prolaborate).
App logo (Optional) Review the tool tips for details about the type of image you can use for your logo.
App visibility You can leave these options unchecked.

Configure SAML

In step 2, fill Section A – SAML Settings as per the instructions below.

Single sign on URL Fields from Prolaborate Service Provider configuration as stated above (In section Service provider Configuration).
Audience URI (SP Entity ID) Fields from Prolaborate Service Provider configuration as stated above (In section Service provider Configuration).
Use this for Recipient URL and Destination URL Select this box as the recipient and destination URL to be the same.

Click on Show Advanced Settings.

Check the Enable Single Logout to allow the application to initiate single logout.

Single Logout URL Get Name fields from Prolaborate Service Provider configuration as stated above (In section Service provider Configuration).For example,
https://localhost/saml/sls
SP Issuer Enter the URL from the Service Provider Name field from Prolaborate
Signature Certificate Browse SSL certificate (.cer file) of Prolaborate instance and click on Upload Certificate

Attribute Statements should be configured as below:

Attribute Name Value
Firstname user.firstName
Lastname user.lastName
Email user.email

You need not change any other settings

Section B is not needed for Prolaborate. You can just click on Next.

Feedback tab

In Step 3, select I’m an Okta customer adding an internal app and This is an internal app that we have created, and Click Finish

Assign Users

In this section, we will assign the Okta users to the Prolaborate application. Click on the Assignments tab.

Click on Assign on the users to whom you want to give access to Prolaborate on Assign Prolaborate to People page.

The users whom we have selected will now show up in the Assignment tab

Sign On Tab

In this section, we will configure the Identity provider to your Prolaborate. Click on the Sign On tab

Click on View Setup Instructions.

Identity Provider Configuration details will be shown in a new tab.

Identity Provider Configuration details will be shown in a new tab

Identity Provider Single Sign-On URL Should be used as Sign In URL field in Prolaborate Identity Provider configuration
Identity Provider Single Logout URL Used as Sign Out URL field in Prolaborate Identity Provider configuration.
Identity Provider Issuer Used as Name field in Prolaborate Identity Provider configuration respectively.

Click on Download Certificate to download the .cer file and it is used as the Certificate field in the Prolaborate Identity Provider configuration respectively.

Identity Provider Configuration

Go back to Prolaborate, and click on Menu → SAML Settings.

Fill the Identity Provider Configuration as per the instructions below:

Identify Provider Select Other
Name Fill using Identity Provider Issuer URL availed from Okta configuration (Refer to the section Sign On Tab ).
Sign In URL Fill using Identity Provider Single Sign-On URL availed from Okta configuration (Refer to the section Sign On Tab ).
Sign Out URL Fill using Identity Provider Single Logout URL availed from Okta configuration (Refer to the section Sign On Tab ).
Certificate Choose the .cer Certificate file from Okta Configuration (Refer to the section Sign On Tab ).

Attribute Mappings

Change the Attribute mapping into the Custom Mode and fill the following values in the respective fields.

Attributes Mappings Claims
First Name Firstname
Last Name Lastname
Email EmailNote:Based on the claims, which is configured in SAML Application. Please choose the Email type.
Group Usergroup

Default Access Control Profile

Click on Manage Profiles to create a new profile.

Click on Create Profile.

Give a name to the Profile and configure permissions.

This is the permission that will be provided to all the users logging into Prolaborate using their SSO credentials.

You can choose any one of the following options:

Include all repositories Any user logging in with their SSO credentials will be given access to all repositories
Choose Specific Repositories Any user logging in with their SSO credentials will be added to the user groups you have specified after selecting the repositories

Click Save.

Now, go back to the SAML Settings page.

Select the newly created profile and click Save.

Log in with Okta Credentials

Once the configuration is done, users will start to see a new button on the login page called Login with SSO.

When they click on Login with SSO,

They will be redirected to an URL as per configuration. They can then give their OKTA credentials to login to Prolaborate.

You will be redirected to Prolaborate successfully if the configuration is done right as said in the document.

If you’re experiencing challenges signing in using SSO, go at SAML Assertion Validation to debug the SAML configurations.

Note the Repositories you see will be based on Default Access Control Profile

Please check the configuration if you are not logged in to Prolaborate.

Logging out from Prolaborate

When a user initiates a logout, the user will be logged out from all applications in the current Identity provider login session.

sparxsystems-logo-inverted

Start Here
Book a Demo