Skip to main content
Skip table of contents

Configure SSO with Okta

This section explains how to configure Web Console Single Sign-On using your Okta SAML app.

The Okta admin UI changes periodically, and the official Okta SAML 2.0 setup documentation is found here:
https://help.okta.com/en/prod/Content/Topics/Apps/Apps_App_Integration_Wizard_SAML.htm


Create SAML App in Okta

  1. Log in to the Okta Admin Portal.
  2. In the top-right corner, click Admin.
  3. Click the Applications tab.
  4. Click Add Application.
  5. In the top-right corner, click Create New App.
    Create New Application Integration window appears. Enter the following parameters:

    NameSetting

    Platform

    Web

    Sign on methodSAML 2.0
  6. Click Create.
    The Create SAML Integration page appears.
  7. In the General Settings tab, enter your App Name (for example, LogRhythm Web Console - LRXM01 or LogRhythm WC - Boulder).

  8. Click Next.

  9. In the General section of the Configure SAML tab, enter the following parameters:
  10. In the Attribute Statements section of the Configure SAML tab, enter the following parameters:

    NameName formatValue
    firstNameUnspecifieduser.firstName
    lastNameUnspecifieduser.lastName
  11. In the Group Attribute Statements section of the Configure SAML tab, do not enter any values:

    NameName formatFilter
    Leave blankLeave blankLeave blank
  12. Click Next.
  13. In the Feedback tab, select the following statements:
    1. Are you a customer or partner. I'm an Okta customer adding an internal app
    2. App type. This is an internal app that we have created
  14. Click Finish.
  15. On the Application page for the app you just created, click the Assignments tab.
    1. Use the People or Groups filters to locate and select the user(s) or groups you want to have access to the Web Console SSO app.
    2. Click Assign.
  16. Your Okta SSO app configuration is now complete.

Gather IdP SSO Configuration Data

  1. Log in to the Okta Admin Portal.
  2. In the top-right corner, click Admin.
  3. Click the Applications tab.
  4. Choose the SAML app you have created for LogRhythm SSO.
  5. Click the Sign On tab.
  6. Under Sign On Methods, click View Setup Instructions.
  7. Copy the values in the "Identity Provider Single Sign-On URL" and "X.509 Certificate" fields, and paste the values to a temporary location.

    You can ignore the Optional IdP Metadata section.


Enable Single-Sign On in the LogRhythm Web Console (Admins Only)

  1. Log in to the Web Console with an administrator account or with an account that has "SSO Management (Web Console)" and "Manage User Profiles" permissions.
  2. In the upper-right corner, click the Administration drop-down icon, then click Single Sign-On.
    The Single Sign-On Configuration menu appears.
  3. Click the Single Sign-On Enabled button. The menu expands to reveal configuration fields.
  4. Enter the following parameters:

    If you want to choose a User Profile that is specific to newly-created SSO users, consider creating the desired User Profile in the SIEM before this step.

    NameExample Format

    Web Console Callback URL

    https://<FQDN_or_Hostname_or_IP_of_WebConsole>:8443/saml

    Web Console Identifier (Entity ID)https://<FQDN_or_Hostname_or_IP_of_WebConsole>
    IdP Entry PointIdentity Provider Single Sign-On URL copied from Okta.
    IdP CertificateX.509 Certificate copied from Okta.
    Default User ProfileThe User Profile to be assigned via User Auto-Provisioning to new SSO users.

    If you do not see all of the expected User Profiles in the drop down menu, contact your SIEM administrator to make sure they have enabled your Manage User Profiles and Single Sign-On Management (Web Console) permissions.

  5. Click Save

    While saving, your Web Console will temporarily disconnect and you will see either Reconnecting or Disconnected status in the upper-right corner.

    Refresh your browser if prompted to do so.

  6. After your Web Console refreshes and the status shows Connected, your SSO for the Web Console is enabled.
  7. In the upper-right corner, click the User drop-down icon, and then click Logout
JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.