To set up Okta as the Identity Provider for Celona Orchestrator (CSO), follow these steps:
Step 1: Create a New SAML Application in Okta
Access Okta Dashboard
Log in to your Okta Admin Console.
Navigate to Applications
Provide General Settings
Step 2: Configure SAML Settings
Single Sign-On URL
Audience URI (SP Entity ID)
Enter the Entity ID from the Orchestrator metadata.
Attribute Statements
Step 3: Add Custom Group Attribute Statements
If you're configuring for MSP SSO:
Navigate to the Group Attribute Statements section in Okta.
Add a custom attribute with:
Step 4: Grant Access to Relevant User Groups
Assign the application to the relevant user groups:
Select the appropriate groups to grant access to the Celona Orchestrator application.
Step 5: Finalize and Test SSO
Save your configuration in Okta.
Access the SSO Launch URL from CSO:
Use:
https://<cso-fqdn>/v1/api/ssogw/saml/login/alias/<customer_alias_value>
The <customer_alias_value> will be:
<companyName>_self_serve where <companyName> is
Account Name
without whitespace as displayed on theAccount Info
page.Use Case-1: If the SSO launch point is from the `IDP Dashboard, then a separate icon bookmarked to the above URL can be added (Okta has Bookmark App to hyperlink for an Icon. Ex: Celona)
Use Case-2: If the SSO launch point is from the Customer Portal, the above URL needs to be embedded as a hyperlink inside the portal.
Login Flow:
Ensure redirection to the Okta login page.
After successful login, verify that the user is provisioned and assigned the correct CSO role.
To complete the SSO configuration, follow the steps in the SSO Configuration Guide for IT Admins.
For further assistance, contact Celona Support.