Okta

How to Configure SAML 2.0 for Birst

Before you begin

Read this before you enable SAML

The Birst application is pre-configured to pass the custom attributes as part of the SAML assertion. Make sure that the custom attributes are populated in the Okta User Base Profile, and also have the correct attribute mappings set with AD/LDAP (if needed). If this value is empty, Okta will pass null values to Birst.

If you don’t need to send custom attributes, skip these steps.

Follow these instructions to add a custom attribute:

  1. In Okta, navigate to Admin > Directory > Profile Editor.

  2. Select the Okta filter in the left side navigational pane.

  3. Click the edit Profile button.

    “birst1.png"

  4. Click Add Attribute.

    “birst2.png"

  5. Enter an attribute value for the Display name and Variable name fields.

  6. If needed, enter a Data Type.

  7. Click Add Attribute.

    “birst3.png"


The following Birst attributes are supported:

Birst Attribute Name Okta Attribute Variable Name
birst.embedded

birst_embedded

birst.module

birst_module

birst.spaceId

birst_spaceId

birst.dashboard

birst_dashboard

birst.page

birst_page

birst.filters

birst_filters

birst.hideDashboardNavigation

birst_hideDashboardNavigation

birst.hideHeader

birst_hideHeader

birst.themeName

birst_themeName

birst.dashboardParams

birst_dashboardParams

birst.dashParamsSeparator

birst_dashParamsSeparator

birst.hideDashboardPrompts

birst_hideDashboardPrompts

birst.viewMode

birst_viewMode

birst.filterLayout

birst_filterLayout

birst.renderType

birst_renderType

birst.viewHTML5

birst_viewHTML5

birst.helpURL

birst_helpURL

embeddedView

birst_embeddedView

reportName

birst_reportName

birst.userLoginName

birst_userLoginName

birst.userEmailAddress

birst_userEmailAddress

birst.accountId

birst_accountId

birst.memberSpaces

birst_memberSpaces

birst.userProfile

birst_userProfile

birst.defaultSpace

birst_defaultSpace

birst.dashboardsView

birst_dashboardsView

birst.spaceCreation

birst_spaceCreation

birst.userProfile

birst_userProfile

SAML Configuration Steps

  1. Log in to Birst as an administrator.

  2. From the Home page, click ACCOUNT SETTINGS:

    “birstnew1.png"

  3. On the SAML Configurations tab, click Add (the + sign).

  4. Enter a name for your new configuration (here MySAMLConfiguration), then click Save (the check mark).

    “birstnew2.png"

    The SAML configuration screen appears:

    “birstnew3.png"

  5. Enter the Identity Provider Issuer, also called the Entity ID: Copy and paste the following:

    Sign into the Okta Admin Dashboard to generate this variable.

  6. Provide a Certificate: Copy and paste the following (in PEM text format):

    Sign into the Okta Admin Dashboard to generate this variable.
  7. Optionally, enter the URL for a custom error page to be redirected to if an error occurs.

  8. Optionally, enter the URL for a custom log out page to be redirected to on log out.

  9. Enter the idle duration in minutes after which a timeout occurs. The default is 20 minutes.

  10. If you want to allow service provider-initiated access:

    1. Check SP-Initiated.

    2. Identity Provider Single Sign-On: Copy and paste the following:

      Sign into the Okta Admin Dashboard to generate this variable.

  11. Click Save.

  12. For service provider-initiated access:

    1. After you click Save, Birst generates and displays a SAML Configuration ID.

    2. Use this SAML Configuration ID value in the birst.idp query parameter for logging into Birst. For example:

      https://login.bws.birst.com/SAMLSSO/Services.aspx?birst.idpid=SAML_config_ID

    3. When browsers connect to this URL, they are redirected to the Identity Provider Single Sign-On URL as specified in Step 10.

    Tip: Users can bookmark the redirect URL for easier access to Birst.

  13. OPTIONAL: The Birst application is pre-configured to pass the groups as part of the SAML assertion. The following groups attributes are supported: birst.globalGroups, birst.group. In order to send user groups as part of the SAML assertion:

    • In OKTA, select the Sign On tab for the Birst app, then click Edit.

    • Select your preferred group filter from the dropdown list (the Regex rule with the value ".*" in order to send *all* groups to the Birst instance we used in our example) for the required attribute.

    • Click Save.

    “birst_new1.png"

  14. Done!


Notes:

IdP-initiated flows, SP-initiated flows, and Just In Time (JIT) provisioning are all supported.

For SP-initiated flows:

Open the following URL: [yourBaseUrl]?birst.idpid=[yourIdpId]