Skip to main content

 

Steps involved

  1. Create Initial application on OKTA
  2. Configure Forward Enterprise with the details from OKTA
  3. Update OKTA application with the details from Forward Enterprises
  4. Integrate OKTA with Active Directory KOptional]
  5. Assign users to the application

 

Step 1: Create Initial application on OKTA

 

  • Sign in to OKTA
  • Switch to “Admin” mode 
  • From the “Applications” menu, select “Applications” and choose “Add Application”

 

A screenshot of a cell phoneDescription automatically generated

 

  • Choose the type of application as “SAML 2.0”

A screenshot of a cell phoneDescription automatically generated

 

  • Enter a name for the application. 

A screenshot of a cell phoneDescription automatically generated

 

  • Enter “Single sign on URL” and “Audience URI (SP Entity ID)” with temporary information. This is a “placeholder” url and will be replaced in later steps.
  • Download the OKTA certificate. This is a BASE64 encoded certificate and can be opened with notepad or textedit.

A screenshot of a cell phoneDescription automatically generated

 

A screenshot of a cell phoneDescription automatically generated

 

  • Select “I’m an Okta customer adding an internal app” and check “This is an internal app that we have created” under “App type”.

A screenshot of a cell phoneDescription automatically generated

 

A screenshot of a cell phoneDescription automatically generated

 

  • The application has been created at OKTA. The next step is to add these URLs to the Forward Platform. Select “View Setup Instructions”.

A screenshot of a cell phoneDescription automatically generated

 

  • The new window has details that will be mapped to Forward Application. Please note that the “X.509 Certificate” is the same downloaded in the previous step. Either one can be used to configure the application.


 

r4lWRmgwTSeELFWNzq89CAs7dnx9IPEiPOc0ZLlNUxQT-ObYVpaBNHDr91vHcF-MDJpZ4fnEphKUeMr464FzB3capls6_XUNPnK8CqGvSIzZKx7UBPFLbl_3Xim85jCQlBoc_Lfgkll5SufoK4xgsGk

Step 2: Configure Forward Enterprise with the details from OKTA

 

  • Login to the Forward Application or VM and navigate to “Settings => Accounts => Single Sign-On (SSO)” and turn on the “SSO authentication”.

9poD9pKtyFf_KwrJrqRBi-7PxFgOXAqU7PKF3RkRoSdIG2gzG3cuTBBk2rUWr7xf5b3XiMqz6JtKuYmc2sKOHqJwNx5H4iUn-T-ESB1g9mJXgf5Acg1M09arj8yf7ey0cHtqPqorYbFGXIEUn9b0H2U

 

  • Follow the instructions below to finish step 2.

 

Forward Entity

OKTA Entity

Note

SSO redirect URL

Identity Provider Single Sign-On URL

Authentication URL at OKTA

X509 signing certificate

X.509 Certificate

Copy/paste entire content, from “Begin” to “End”, including the “---” characters

SAML entity ID

Identity Provider Issuer

Authenticator Reference

Identity provider name

 

Any relevant name to suggest the external authentication

Network Permissions

 

Default permission when an user logs in

 

  • Copy the “Metadata” to be used in the next step.

 

A screenshot of a cell phoneDescription automatically generated


 

Step 3: Update OKTA application with the details from Forward Enterprises

 

  • Login in to OKTA and navigate to “Directory => Profile Editor” and click on “Profile” 

A screenshot of a cell phoneDescription automatically generated

 

  • Click on the application logo on the top-right

A screenshot of a cell phoneDescription automatically generated

 

  • Navigate to the “General” tab and click on “Edit” under “SAML Settings”.

A screenshot of a cell phoneDescription automatically generated

 

  • Replace the “Single sign on URL” and “Audience URI (SP Entity ID)” with the data from Forward Enterprise “Metadata” downloaded in the previous step.

A screenshot of a cell phoneDescription automatically generated

 

  • Follow the instruction below to finish the step 3

OKTA Entity

Forward Entity

Note

Single sign on URL

AssertionConsumerService, Location

Copy/Paste the value without the quotes

Audience URI (SP Entity ID)

EntityDescriptor, entityID

Copy/Paste the value without the quotes

 

Step 4: Integrate OKTA with Active Directory

  • Login to the OKTA application and navigate to “Directory => Directory Integrations” and click on “Add Directory” and select “Add Active Directory”.

A screenshot of a cell phoneDescription automatically generated

 

  • Click on “Set Up Active Directory” and download the agent.
  • Install the application on any system already joined to the active directory domain.
  • The following information are required to complete this step:
  • Active Directory DNS domain name
  • User ID and Password on the AD domain with minimal permissions, “Domain Users” nService Account]
  • Okta application will run as a service with the user ID provided above. The password can be changed under services when the Service Account password is changed in the future.
  • Login to Okta and navigate to “Directory => Directory Integration” and select the Active Directory domain.
  • Navigate to the “Import” section and choose “Import Now”.
  • Select the user and confirm assignments.

A screenshot of a cell phoneDescription automatically generated

A screenshot of a cell phoneDescription automatically generated

A screenshot of a cell phoneDescription automatically generated

A screenshot of a cell phoneDescription automatically generated

 

A screenshot of a cell phoneDescription automatically generated


 

A screenshot of a cell phoneDescription automatically generated

Step 5: Assign users to the application

Note: users will not be allowed to login without assignment.

 

  • Login to OKTA and navigate to “Directory => Profile Editor” and click on “Profile”. 

A screenshot of a cell phoneDescription automatically generated

 

  • Click on the application logo on the top-right.

A screenshot of a cell phoneDescription automatically generated

 

  • Navigate to the “Assignments” tab and click on “Assign”.
  • Choose “Assign to People” and select the user.

1hEy9QVjoJ8Feey2QD8zlAHR_qm6Ks3pHnRwPdaJUMOSliRANBratpgMPVLYoewyQOv9ESDsSjZnBfGv9JdggO6oo9TOobCvgoXCJuczCm3u_5hZAXspU1XSxYFMktwrTjTWMINoTNmdiQdpHIHzILk




 

Troubleshooting:

Issue #1: “404 PAGE NOT FOUND” 

Error: 

  • “404 PAGE NOT FOUND” when you click on the OKTA login 

Possible Issues:

  • Ensure “SSO redirect URL” in Forward application matches “Identity Provider Single Sign-On URL” on Okta.

 

Issue #2: “Sorry, you can't access FWD-10 because you are not assigned this app in Okta.”

Error: 

  • “Sorry, you can't access FWD-10 because you are not assigned this app in Okta.” 

Possible Issues:

  • Ensure the user is assigned to the application.

 

Issue #3: “SAML validation failed. Response issuer 'http://www.okta.com/exkb17290191s1236x' doesn't match...”

Error: 

  • “SAML validation failed. Response issuer 'http://www.okta.com/exkb17290191s1236x' doesn't match 'http://www.okta.com/exkb17290191s1236x'.Contact your Org admin to resolve the issue.”

kR2oyCOrt9LHJflAt0n5MRbgmG511VrPkPZ9UFCJWJ7amFxClc1xMFXAL5z75sohY6uhJ_WgXBKx8v945uCU452V1wXvpthhXHkQVxpsGlsb1oZj2g5NqNJcZmPT2LeU-ZM6DiBu_j4qabQj6AP9J5g

Possible Issues:

  • Ensure that “SAML entity ID” in Forward application matches “Identity Provider Issuer”

 

Issue #4: “Assertion 'id20367259921980270532999002' with NotBefore condition of '2020-05-05T16:39:17.977Z' is not yet valid”

Error: 

  • “Assertion 'id20367259921980270532999002' with NotBefore condition of '2020-05-05T16:39:17.977Z' is not yet valid” 

Possible Issues:

  • Possible Clock skew. Ensure that the clock on the VM is correct. Forward VM has “VM tools” installed and will automatically sync to the hypervisor

 

Issue #5: “Unable to sign in” when trying to login with Active Directory user or OKTA users

Error: “Unable to sign in” when trying to login with Active Directory user or OKTA users

' fGzPNf3IFwdAR4k4d5uQGnmeInP6YER_hm-A53m4p4MqMDbZGDL_IKPyqXofm_Ofz38P2nRrqlRdYtXY3BxpugOFGiQVMAq2bHtCfyXtxwwvO2Rjy1mSB6dKXYmlPzLfNXIW6PU4USjwYetH-cixifc

 

Possible Issues:

  • Check if the account is activated in OKTA

      From “Admin” section, navigate to “Directory => People” and ensure the user is Active under under “Status” column

 

UNGVWAi3yNEO0SVsn1syr8hj_vYHlB4WujATdyRiUkxl2jaYHhQebI08G50kxBq4AO0I9qG88G7qTeogKjyOydbzbyk24CMKloGCByWg039oojkrDIc2SVy8t6k-u3qFuPYnhQE1CEJ7h1ueFsimd8E
 

 

Be the first to reply!

Reply