The Okta/Shufflrr SAML integration currently supports the following features:
For more information on the listed features, visit the Okta Glossary.
Login your Shufflrr account as an administrator.
Go to Admin > Settings, then under Authentication click + Add adjacent to SAML Sign-On.
Enter the following:
Profile Name: Enter a name.
Save the Subdomain value from the Service Provider ID field.
For example, if your Service Provider ID is https://AcMe.shufflrr.com; your Subdomain value is AcMe.
Note: You’ll need to enter this value in the Subdomain field under the General application tab in Okta. The Subdomain value is case-sensitive. Make sure you copy the exact value.
[Optional SLO]: Service Provider Certificate: Click Download to download and save the certificate.
Identity Provider Certificate: Download, then Upload the following:
Sign into the Okta Admin Dashboard to generate this variable.
Identity Provider Issuer ID: Copy and paste the following:
Sign into the Okta Admin Dashboard to generate this variable.
Single Sign-on Service URL: Copy and paste the following:
Sign into the Okta Admin Dashboard to generate this variable.
Enforce SAML Groups, Sign Authentication Request, SAML Response Signed, SAML Assertion Signed: Switch to ON.
SAML Assertion Encrypted: Switch to OFF.
Service Provider ACS URL: Make a note of the last part of the URL. It’s your Connection ID value.
For example, if your Service Provider ACS URL is https://acme.shufflrr.com/login/samlassertionconsumerservice?id=12345678-abcd; your Connection ID is 12345678-abcd
[Optional SLO]: In the Single Logout section do the following:
Enable Single Logout: Switch to ON.
Single Logout URL and Single Logout Response URL: Copy and paste the following:
Sign into the Okta Admin Dashboard to generate this variable.
Logout Request Signed, Logout Response Signed, Sign Logout Request, Sign Logout Response: Switch to ON.
Scroll down to the bottom of the page and click Save.
In Okta, select the Sign On tab for the Shufflrr app, then click Edit.
To pass Okta groups as part of the SAML response:
Select your preferred group filter from the roles drop-down list (the Regex rule with the value .* in order to send all Okta groups to the Shufflrr instance we used in our example) for the attribute.
[Optional SLO]: Check Enable Single Logout.
Select and Upload the Service Provider Certificate (step 3c).
Scroll down to Advanced Sign-on Settings.
Enter the Connection ID (step 3i) into the corresponding field.
Click Save.
Done!
Make sure that you entered the correct value from step 3b in the Subdomain field under the General tab in Okta. Using the wrong values will prevent you from authenticating via SAML to Shufflrr.
The following SAML attributes are supported:
Name | Value |
---|---|
FirstName | user.firstName |
LastName | user.lastName |
user.email | |
roles | This is configured in the app UI; see groups attribute instructions (step 6) above. |
Go to https://[your-shufflrr-subdomain].shufflrr.com and click Single Sign-On.