Setup Okta as Identity Provider
In Okta you can choose to authenticate using SAML or OIDC. There is no difference between those options in Salted CX. You can choose the one that you prefer.
After you setup the application you have to assign it to users and choose permissions for them. See for details.
Authentication via SAML
Add Salted CX as a SAML application to Okta
-
In Salted CX Settings, go to Single Sign On → SAML page and copy the SSO URL and the Audience URI.
-
In you Okta instance go to Okta Admin console → Applications → Applications → Create App Integration.
-
Select SAML 2.0.
-
Fill in the app name and check Do not display application icon to users.
-
Fill the Single sign-on URL and Audience URI fields with the values from step one.
-
Set up the following required Attribute Statements:
Name Name format Value email Basic user.email
name Basic ${user.firstName} {user.lastName}
cxsaltedpermissions Basic Value depending on what permissions you want to give the users by default. noteTo learn more about how permissions work, read the Permissions docs.
-
Click Next and Finish to create the application.
-
Copy the Metadata URL found in the Sign On tab of the Okta application you just created.
-
Go back to Single Sign On page in Salted CX settings and paste in the Metadata URL.
Create a Bookmark App to show Salted CX in Okta Dashboard
Currently, we do not support identity provider initiated authentication flow. If you want to display a Salted CX app tile to your users in Okta dashboard or in the Okta Browser Plugin, you can create a Bookmark App.
- Go to Okta Admin console → Applications → Applications → Browse App Catalog.
- Search for Bookmark App.
- Fill the application label and the URL of your Salted CX instance, for example
https://company.us.salted.cx
.
Authentication via OpenID Connect — OIDC
Add Salted CX as an OIDC application to OKTA
- In Salted CX Settings, go to the Single Sign On → OIDC page and copy the Redirect URI.
- Go to Okta Admin console → Applications → Applications → Create App Integration.
- Select OIDC - OpenID Connect → Web Application.
- Pick and fill in the app name (e.g Salted CX, but you can choose whatever name you like) and check the Authorization Code and Refresh Token grant type.
- Add the url from step one to Sign-in redirect URIs. Leave Sign-out redirect URIs empty.
- Select Skip group assignment for now and Save.
- After the app is created, copy the Client ID and Client secret and paste them into the Salted CX OIDC settings page.
Add cxsaltedpermissions attribute to Salted CX OIDC app
- In Okta Admin console, go to Directory → Profile Editor and find the Salted CX OIDC app you created in the previous section.
- Click on the app to open its Profile Editor and click on the Add attribute button.
- Fill in the following values and save:
- Data type: string
- Display name: Salted CX Permissions
- Variable name: cxsaltedpermissions
- Attribute required: yes
- User permissions: Read Only
Assign Salted CX app to a user or a group
- In Okta Admin console, go to Applications → Applications
- Click on the Salted CX app to open its details page.
- Select the Assignments tab.
- Click on the Assign button and select the user or group you want to assign the app to.
- Click Assign
- Fill in the
cxsaltedpermissions
attribute based on the permissions you want to grant the user or the group.