Configure SAML SSO
This document shows in detail how to configure your SAML SSO using Okta, but most similar platforms that support SAML should have similar steps.
Configuration Steps:
To configure Luciq with Okta, you will need to follow these steps:
Create an Okta account https://www.okta.com/free-trial/
Sign up in Luciq's dashboard using the same email address as Okta
At Luciq's dashboard, open the account settings> SSO > SAML and configure it.
At Okta's dashboard, click on the "Admin" button to open the admin panel
Set up verification with the Okta Verify app (if needed)

Create a new application of "SAML" type
From the sidebar, go to applications
Select "Create App Integration"

Select SAML 2.0 type and click “Next“

General settings: enter the app name and click “Next“

At configurations: enter the mapped values as follows from the dashboard Configure SAML SSO modal and then click “Next“
Single sign-on URL → Service Provider SSO Callback URL (found on Configure SAML SSO modal on dashboard)
Audience URI (SP Entity ID) → Service Provider Entity ID modal (found on Configure SAML SSO modal on the dashboard)
leave Default RelayState empty
Name ID format: select EmailAddress
Application username: select email
Feedback: select I'm a software vendor. I'd like to integrate my app with Okta and click “Finish”
From applications, open the created app, then select the “Sign On” tab
Scroll to “View Setup Instructions” and open it

Download Okta certificate
You can set up a fingerprint or upload the certificate directly
Uploading certificate
At the Luciq dashboard, Configure SAML SSO modal and select Certificate
Upload downloaded certificate from step 9

In SAML/idP metadata URL → add the Identity Provider Single Sign-On URL value on “View Setup Instructions” in Okta dashboard
Setting fingerprint manually
At your terminal change directory to where you downloaded the certificate in step 9
Execute
openssl x509 -noout -fingerprint -sha1 -inform pem -in okta.certCopy the fingerprint value, which should look something like this:
F4:95:55:6E:97:D7:B6:26:56:3C:D0:4D:A0:D3:E4:05:B3:11:FF:B7At the dashboard Configure SAML SSO modal select Fingerprint and enter the mapped values
Identity Provider Certificate Fingerprint → paste the value you get from the terminal
Identity Provider Certificate Fingerprint Algorithm → choose SHA1
SAML/idP metadata URL → Identity Provider Single Sign-On URL value on View Setup Instructions in Okta dashboard
Logout from your normal account
Select login with SSO
Enter the Okta email that you assigned app to then your credentials on Okta form
After redirecting change dash-dev to deploy
Tada! 🎉

If you disabled SSO and then re-enable it, it will be enabled immediately for the whole company (without needing to login using SSO first)
Last updated

