The Okta/Bomgar SAML integration currently supports the following features:
Login to your Bomgar account as an administrator.
Navigate to USERS & SECURITY > SECURITY PROVIDERS.
Click Create Provider.
The SAML configuration screen appears.
Under General Settings, enter the following:
Name: Enter Okta.
Check the Enabled box.
Copy and save the following as metadata.xml.
Sign in to the Okta Admin app to have this variable generated for you.
Under Identity Provider Settings, enter the following:
Metadata: Click Choose File, then navigate to the metadata.xml file you just saved.
Click Upload Identity Provider Metadata.
Note: Other fields such as Entity ID and Single Sign-On Service URL are populated automatically once the metadata is uploaded.
Wait for a The metadata was successfully uploaded message to appear, then continue with the User Provision Settings below.
Under User Provision Settings, enter the following (use the default values):
Username: Username.
Check the Use the same attribute for public and private display names box.
Display Names: {FirstName} {LastName}.
Under Authorization Settings, enter the following:
Attribute Name: Groups.
Default Group Policy: Select your Default Group Policy from the drop-down list.
Click Save Changes:
In Okta, select the Sign On tab for the Bomgar application, then click Edit:
Select your preferred Groups filter from the dropdown list.
Note: The Regex rule with the value ".*" in order to send *all* Okta groups to the Bomgar instance we used in our example below.
Email Attribute Value: Select the value (either email or username) that will be mapped to Email SAML attribute.
Click Save:
Done!
Make sure that you entered the correct value in the Base URL field under the General tab in Okta. Using the wrong value will prevent you from authenticating via SAML to Bomgar.
The following SAML attributes are supported:
Name | Value |
---|---|
FirstName | user.firstName |
LastName | user.lastName |
user.userName OR user.email | |
Username | user.userName |
Groups | This will be configured in the app UI; see groups attribute instructions above. |
Open https://[yourBaseUrl]/login/login.
Click Use SAML Authentication: