Okta

How to Configure SAML 2.0 for Meta Networks Connector

Contents


Supported Features

The Okta/Meta Networks Connector SAML integration currently supports the following features:

For more information on the listed features, visit the Okta Glossary.


Configuration Steps

  1. Make sure your Meta Networks account has the Settings write privilege turned on.

  2. Log in to your Meta Networks administration account by using your organization short name here: https://[orgShortName].metanetworks.com/ .

  3. Navigate to Administration > Settings > IdP, then click the + (plus) button:

    metanetworks_new1.png

  4. In the DETAILS section:

    • IdP Settings Name: Enter Okta.

    • IdP Settings Description: Enter any description.

    • Enable IdP Settings: Turn this on.

    metanetworks_new2.png

  5. In the Icon section, select the Okta icon:

    metanetworks_new3.png

  6. In the CONFIGURE SAML AUTHENTICATION section, enter the following:

    • Identity Provider Single Sign-On URL: Copy and paste the following:

      Sign into the Okta Admin Dashboard to generate this variable.

    • Identity Provider Issuer:: Copy and paste the following:

      Sign into the Okta Admin Dashboard to generate this variable.

    • X.509 Certificate: Copy and paste the following:

      Sign into the Okta Admin Dashboard to generate this variable.
    • Authentication Context Class: Select PasswordProtectedTransport.

    • OPTIONAL: Enable Just-in-Time Provisioning.

    • Click Save:

    metanetworks_new4.png

  7. Done!


Notes

Make sure that you entered the correct value in the Organization short name field under the General application tab in Okta. Using the wrong value will prevent you from authenticating via SAML to Meta Networks Connector.

For example, if you log into https://acme.metanetworks.com/, enter: acme.


The Meta Networks Connector SSO URL and Audience URI (SP Entity ID) values are automatically set in Okta by setting the organization short name. If you want to set the SSO URL and Audience URI (SP Entity ID) values manually, follow the steps below:

  1. In the Meta Networks administration account navigate to Administration > Settings > IdP.

  2. Select your Okta configuration:

  3. metanetworks_new5.png

  4. Under the SSO URLS tab, note the SSO URL and Audience URI (SP Entity ID) values.

  5. metanetworks_new6.png

  6. In Okta, select the Sign On tab for the Meta Networks Connector application, then click Edit.

    • Scroll down to the ADVANCED SIGN-ON SETTINGS section.

    • Enter the SSO URL and Audience URI (SP Entity ID) values (step 3) into the corresponding fields.

    • Click Save:

    metanetworks_new7.png

  7. Done!


Supported SAML Attributes

The following SAML attributes are supported:

Adding the groups attributes

The groups attribute is a comma-separated list of group names, with which the user is associated. Upon successful login the user will be associated with each of the groups, provided that group exists in Meta Networks system.

Here is an example describing how to add and use the additional groups attribute:

  1. In Okta, navigate to Directory > Profile Editor.

  2. Search for the Meta Networks Connector app, then click Profile:

  3. metanetworks2.png

  4. Click Add Attribute, then enter the following:

    1. Display Name: Enter groups attribute name.

    2. Variable Name: groups.

      Important: You must use the following variable name for the groups attribute: groups.

    3. Click Save.

    Note: Scope (optional): If you check User personal, it means that the current attribute will be available once you assign the user to the Meta Networks Connector application and will not be available once you assign the group to the app.

    metanetworks3.png

  5. Now you can specify group attribute value for assigned users or groups or just map it to a required attribute from the base user profile in Okta.

    metanetworks4.png

  6. SP-initiated SSO

    1. Open your Meta Networks login URL by using your organization short name: https://[orgShortName].metanetworks.com/.

    2. Click Login with okta:

    3. metanetworks_new8.png