SAML with Okta
This guide walks you through configuring SAML 2.0 SSO between Okta and NetActuate.
Prerequisites
- Admin access to your Okta organization
- Admin access to the NetActuate portal
- A verified domain in your NetActuate account
Step 1: Create a New Application in Okta
- Log in to the Okta Admin Console.
- Navigate to Applications → Applications → Create App Integration.
- Select SAML 2.0 and click Next.
- Enter an application name (e.g., "NetActuate") and click Next.
Step 2: Configure SAML Settings in Okta
Enter the following values in the SAML settings:
| Field | Value |
|---|---|
| Single Sign-On URL | https://portal.netactuate.com/saml/acs |
| Audience URI (SP Entity ID) | https://portal.netactuate.com/saml/metadata |
| Name ID Format | EmailAddress |
| Application Username | Email |
Step 3: Configure SAML Attribute Statements
Add the following attribute mappings:
| Name | Name Format | Value |
|---|---|---|
email | Unspecified | user.email |
firstName | Unspecified | user.firstName |
lastName | Unspecified | user.lastName |
Note: The attribute names must match exactly as shown above. NetActuate uses these attributes to identify and provision users.
Step 4: Complete Okta Setup
- Click Next to proceed to the feedback step.
- Select "I'm an Okta customer adding an internal app" and click Finish.
- On the application page, click the Sign On tab.
- Under SAML Signing Certificates, click Actions → View IdP metadata for the active certificate.
- Copy the metadata URL or download the metadata XML file.
Step 5: Configure NetActuate
- Log in to the NetActuate portal.
- Navigate to Account → Settings → SAML.
- Enter the IdP metadata URL or upload the metadata XML file from Okta.
- Click Save.
Step 6: Assign Users in Okta
- In the Okta Admin Console, go to the NetActuate application.
- Click the Assignments tab.
- Assign the application to users or groups who need access.
Step 7: Test the Integration
- Open a new incognito/private browser window.
- Navigate to the NetActuate portal login page.
- Select SSO Login and enter your corporate email address.
- Verify that you are redirected to Okta and can authenticate successfully.
Note: If authentication fails, verify that the user is assigned to the application in Okta and that the attribute mappings are correct.
Troubleshooting
- "User not found" error: Ensure the user's email in Okta matches their NetActuate account email.
- Certificate errors: Verify the IdP metadata URL is accessible and the certificate has not expired.
- Redirect loop: Confirm the Single Sign-On URL and Audience URI are entered correctly in Okta.
Need Help?
If you run into issues, contact NetActuate Support.