Integrating with Okta SSO (via SAML)
This article walks you through configuring a SAML 2.0 integration so that users can leverage single sign-on into Qwiet from your Okta instance.
note
SAML integration is a premium feature; please contact your customer success or sales representative if you'd like to enable this feature.
Requirements
- You must be an org owner or a super admin.
- You must have the following information:
SHIFTLEFT_ORG_ID
. These values are available in the Qwiet Dashboard.
Supported features
- IdP-initiated SSO
- SP-initiated SSO
- Just-In-Time provisioning
For more information on the listed features, visit the Okta Glossary.
The Okta integration
To create a SAML connection with Okta, you'll need to:
- Log in to your Okta account.
- Navigate to the Admin Console by clicking your name in the top right corner and selecting Admin.
- In the left menu, click Applications > Applications.
- Click Browse App Catalog and search for Qwiet AI application.
- Click on Add Integration.
Configuration steps
- Copy the Metadata URL from the Okta Admin Console, SAML 2.0 Sign on methods section.
- Contact Qwiet support and request that they enable SAML 2.0 for your account. Include the "Metadata URL" value from the previous step. The Qwiet support team processes your request and provides you with: your organization ID, your SSO configuration name, and a metadata URL.
- In your Okta Admin Console, select the General tab for the Qwiet AI SAML app, then click "Edit" and follow the steps below:
- ensure that the "Organization ID" and "SAML Configuration Name" are populated with the data from Qwiet support
- Application username format: Select "email".
- Click "Save".
- Your SAML configuration for Qwiet AI is complete. You can start assigning people to the app.
Logging in
Users should be able to log in by:
- Visiting their Okta dashboard and clicking on the Qwiet AI application icon
- Visiting
app.shiftleft.io/login
, clicking Login with SSO, and entering their credentials - Visiting
app.shiftleft.io/sso/{sso_name}
and providing their credentials