Configure SSO between Cerby and Okta with OIDC

This article describes how to configure Okta to enable SSO authentication for your new Cerby workspace using OIDC.

Configure SSO between Cerby and Okta with OIDC

circle-info

Who can configure this feature?

  • WorkspaceOwners

With Cerby, you can configure Okta as your primary identity provider (IdP) to leverage single sign-on (SSO) authentication for your organization.

When you create a new Cerby workspace (therefore, becoming the workspaceOwner), you can configure an OpenID Connect (OIDC) integration for it. With this integration, all the users assigned to the Cerby application in your Okta tenant can use their Okta login credentials to securely authenticate to Cerby.

This article describes how to configure Okta as the primary IDP for your Cerby workspace to enable SSO authentication using an OIDC integration.

circle-info

NOTE: Currently, the configuration involves creating an app integration in Okta from scratch. To simplify the configuration, our Development team is working on adding a single OIDC and SCIM app integration for Cerby to the Okta Integration Network (OIN) catalog.


Supported features

The following are the supported features of an Okta OIDC integration:

  • Service provider-initiated authentication flow. This authentication flow occurs when users attempt to log in to the app through their Cerby workspace.

  • Automatic user account creation in Cerby. This provisioning flow in Cerby occurs automatically on the initial SSO.

circle-info

NOTE: OIDC-based workspaces don’t currently support guest users. This feature will be available in future releases.


Requirements

The following are the requirements to perform the configuration:

  • Okta

    • An Okta tenant

    • A user account in Okta with privileges to manage an app integration

    • Users and groups created beforehand in your Okta directory. Follow the corresponding instructions in the Okta Help Center to manage users and groups:

NOTE: When pushed to the app integration for Cerby, Okta groups become Cerby teamsarrow-up-right.

  • Cerby

    • An invite to create a workspace emailed by the Cerby Customer Support team ​IMPORTANT: If you have not received an invite, send an email to support@cerby.comenvelope with your request

    • A user account in Cerby with the workspaceOwner role ​NOTE: You automatically become the Owner when you log in to your Cerby workspace after creating and configuring it


Configure SSO between Cerby and Okta with OIDC

To configure SSO between Cerby and Okta with an OIDC integration, you must complete the following main steps:

  1. Create a Cerby workspace

  2. Create an OIDC app integration in Okta

  3. Assign users and groups to the OIDC app integration in Okta

  4. Configure the OIDC integration in Cerby

circle-info

NOTE: Depending on the use case, you may be redirected to Okta for authentication if a session has not been established.

The following sections describe each main step.

1. Create a Cerby workspace

To create a Cerby workspace, complete the following steps:

  1. Click the Create my workspace button in the invitation email you received from Cerby. The Welcome to Cerby page is displayed in a new browser tab, as shown in Figure 1.

Figure 1. Welcome to Cerby page

  1. Click the Continue with Okta OIDC button. The Create your workspace page is displayed.

  2. Enter a name for your workspace in the Workspace name field. Use only lowercase letters and avoid entering spaces and special characters. For example, contentzilla.

NOTE: Remember the workspace name that you have entered. You need it later.

  1. Click the Create Workspace button. The Configure SSO between Cerby and Okta with OIDC page is displayed with instructions to configure the OIDC app integration in your Okta tenant, as shown in Figure 2.

Figure 2. Configure SSO between Cerby and Okta with OIDC page

triangle-exclamation

The next step is 2. Create an OIDC app integration in Okta, which you must complete in Okta.

2. Create an OIDC app integration in Okta

To create an OIDC app integration in Okta, complete the following steps:

  1. Log in to the Okta Admin Consolearrow-up-right of your organization.

  2. Select the Applications option from the Applications drop-down list located in the left navigation drawer. The Applications page is displayed, as shown in Figure 3.

Figure 3. Applications page in the Okta Admin Console

  1. Click the Create App Integration button. The Create a new app integration dialog box is displayed.

  2. Select the OIDC - OpenID Connect option. The Application type section is displayed below.

  3. Select the Web Application option in the Application type section.

  4. Click the Next button. The dialog box closes, and the New Web App Integration page is displayed.

  5. Set up your new app integration by completing the following steps:

    • Enter a name for your app integration in the App integration name field. For example, Cerby OIDC app.

    • Select the Refresh Token option in the Grant type section.

    • Edit the prefilled URI in the Sign-in redirect URIs section to include the subdomain and domain of your Cerby workspace. For example, https://contentzilla.cerby.com/auth/callbackarrow-up-right.

    • Delete the prefilled URI in the Sign-out redirect URIs section.

    • Select the corresponding option for the Controlled access configuration in the Assignments section:

      • Allow everyone in your organization to access

      • Limit access to selected groups

      • Skip group assignment for now

  6. Click the Save button. A success message and the app integration details page are displayed with the General tab activated.

The next step is 3. Assign users and groups to the OIDC app integration in Okta, which you must complete in Okta.

3. Assign users and groups to the OIDC app integration in Okta

To assign existing users and groups to the OIDC app integration in Okta, complete the following steps from the app integration details page:

  1. Activate the Assignments tab of the app integration details page. The users of your Okta directory are displayed in the People table, as shown in Figure 4.

Figure 4. People table in the Assignments tab

  1. Assign individually the users from your directory to the OIDC app integration by completing the following steps:

    1. Select the Assign to People option from the Assign drop-down list. A dialog box for assigning users is displayed, as shown in Figure 5.

Figure 5. Dialog box for assigning users to the OIDC app integration

IMPORTANT: Make sure that the username is a valid email address.

3. Assign the groups you have already created to the OIDC app integration by performing the following steps: 1. Select the Assign to Groups option from the Assign drop-down list. A dialog box for assigning groups is displayed, as shown in Figure 6.

Figure 5. Dialog box for assigning groups to the OIDC app integration

TIP: To verify the groups are successfully assigned to the OIDC app integration, click the Groups button from the Filters column of the table. The groups you assigned are displayed in the table.

The next step is 4. Configure the OIDC integration in Cerby, which you must complete in the page you kept open with values you retrieve from Okta.

4. Configure the OIDC integration in Cerby

To configure the OIDC integration in Cerby, complete the following steps:

  1. Activate the General tab in the app integration details page in Okta, as shown in Figure 6.

Figure 6. General tab in the app integration details page

  1. Click the Copy to clipboard (

    ) icon of the Client ID field in the Client Credentials section to copy the client ID.

  2. Paste the client ID in the Client ID field of the page you kept open in Cerby.

  3. Click the Copy to clipboard icon below the Secret column in the CLIENT SECRETS section to copy the client secret.

  4. Paste the client secret in the Client Secret field of the page you kept open in Cerby.

  5. Enter the issuer URL of your Okta tenant in the Issuer URL field of the page you kept open in Cerby. The URL contains the unique subdomain assigned to your Okta organization. For example, https://contentzilla.okta.comarrow-up-right.

IMPORTANT: Make sure the URL doesn’t have a trailing slash (/).

  1. Click the Done button in the page you kept open in Cerby. The page closes, and the dashboard of your Cerby workspace is displayed.

  2. (Optional) Configure adding tiles in the Okta dashboard for all users by completing the following steps:

    1. Click the Edit button in the General Settings section of the app integration details page in Okta.

    2. Select the corresponding option in the Login initiated by drop-down list:

      • App Only: The user must go to the Okta tenant URL to log in**.**

      • Either Okta or App: The user can see a tile in their Okta dashboard.

    3. Select the Display application icon to users option in Application visibility.

    4. Enter the URL of your Cerby workspace in the Initiate login URI field. For example, https://contentzilla.cerby.comarrow-up-right.

    5. Click the Save button. A success message is displayed.

Now you are done.

triangle-exclamation
circle-info

NOTE 1: Users and groups assigned to the OIDC app integration in Okta can now access their Cerby workspace with SSO authentication through the corresponding tile in their Okta dashboard. In Cerby, user accounts are automatically created after the initial SSO login.

circle-info

NOTE 2: The OIDC-based integration leverages Okta only for authentication. To assign permissions within the Cerby workspace, users must do so directly in the Cerby platform.

Last updated