Okta
Follow this step-by-step guide to configure the integration between Port and Okta using a SAML application.
To complete the process, you will need to contact us to receive the necessary information and provide the details Port requires from you.
The Port team will provide you with your CONNECTION_NAME, which will be used in the SSO application's configuration.
Port-Okta integration benefitsโ
- Connect to the Port application via an Okta app.
- Your Okta groups will be automatically synced with Port upon a user sign-in.
- Set granular permissions on Port according to your Okta groups.
Register a new application and generate the required credentialsโ
-
Sign in to your Okta Admin Console.
-
Navigate to
Applicationsand click onApplicationsagain. -
Click on the
Create App Integrationbutton. -
In the pop-up, select
SAML 2.0and click onNext. -
In the
General Settings, enter a name for the application and click onNext. -
On the
Configure SAMLpage, underSAML Settings, you will need to fill in some details:- Single sign on URL:
https://auth.getport.io/login/callback?connection={CONNECTION_NAME} - Audience URI (SP Entity ID):
urn:auth0:port-prod:{CONNECTION_NAME}
- Single sign on URL:
-
Scroll down to the
Attribute Statements (Optional)section and add the following:email, with theValueset touser.emailgiven_name, with theValueset touser.firstNamefamily_name, with theValueset touser.lastNameemail_verified, with theValueset totrue
-
Click
Nextand thenFinishto create the application.
Generate a Certificate and Send to Portโ
To secure the SAML integration, you need to generate a certificate and send it to Port:
-
In the Okta Admin Console, navigate to
Applications, and select the newly created SAML application. -
Go to the
Sign Ontab and scroll down to theSAML Signing Certificatessection. -
Click on
Generate new certificate. -
In the dialog, specify the certificate details such as the name and duration, then click
Generate. -
After generating the certificate, download it by clicking on the
Actionsbutton next to the new certificate and selectingDownload certificate. Choose thePEMformat. -
Send the PEM certificate file along with the Identity Provider metadata URL (available in the
Sign Ontab) to Port.
After configuring the SSO connection, you can initiate the login flow directly via URL.
Use the following URL based on your account region, and make sure to to replace {CONNECTION_NAME} with the value provided to you by Port.
- EU
- US
https://auth.getport.io/authorize?response_type=token&client_id=96IeqL36Q0UIBxIfV1oqOkDWU6UslfDj&connection={CONNECTION_NAME}&redirect_uri=https%3A%2F%2Fapp.getport.io
https://auth.us.getport.io/authorize?response_type=token&client_id=4lHUry3Gkds317lQ3JcgABh0JPbT3rWx&connection={CONNECTION_NAME}&redirect_uri=https%3A%2F%2Fapp.us.getport.io
Expose Groupsโ
To expose your Okta groups to Port via the application, follow these steps:
-
In the
Generaltab of your Okta application, clickEdit. -
Scroll down to the
Group Attribute Statementssection. -
Add a group attribute using the following settings:
- Name:
groups - Filter:
Regex - Value: Use a regular expression that matches the groups you wish to send to Port (e.g.,
.*for all groups or a specific pattern).
- Name:
-
Save your changes.
These groups will be ingested into Port as teams, enabling you to manage user permissions and RBAC in your Port account.