Configure Okta for SSO in your Code42 cloud environment
Who is this article for?
Incydr, yes.
CrashPlan for Enterprise, yes.
Code42 for Enterprise, yes.
CrashPlan for Small Business, no.
Overview
This tutorial explains how to configure your Code42 cloud environment to use single sign-on (SSO) with Okta. This article applies to environments in the Code42 cloud only. If you have an on-premises authority server, see Configure Okta for SSO in your Code42 environment.
For instructions about how to use Okta with Code42's provisioning provider feature, see How to provision users to Code42 from Okta.
This article assumes you are already familiar with SSO and the SAML standard. For more information about how Code42 implements SSO, see our Introduction to single sign-on.
Compatible Code42 components
Considerations
- Code42 supports service provider-initiated SSO but does not support identity provider-initiated SSO. Therefore, users cannot sign into your Code42 environment from the identity provider's website or application, but instead must log in using a browser bookmark.
Contact Code42 support for help with authentication issues caused by interaction with Code42 products. However, troubleshooting authentication issues outside your Code42 environment is beyond the scope of our Customer Champions.
- Okta uses SHA-256 for the SAML signature algorithm, and Code42 also uses SHA-256 by default. If you need to change Code42 to use another algorithm, employ the Code42 API to set the requestAuthnSignatureMethod and requestAuthnDigestMethod attributes. For directions, see Use the Code42 API to set SAML attributes.
Before you begin
Configure your private network, Internet, and VPN settings to allow client devices to communicate with your identity provider on ports 80 and 443. Test client connectivity to the identity provider before you proceed.
Step 1: Determine the server URL for your Code42 environment
- Sign in to the Code42 console.
- Navigate to Administration > Integrations > Identity Management.
- Copy and paste the Code42 Service Provider Metadata URL in a new browser window.
Your Code42 environment's metadata details appear. - Record the URL for the entityID. You will use this for the Server URL when configuring Okta in Step 3.
Step 2: Add the Okta application for Code42
Step 3: Configure Okta's sign on tab
- In the Okta Dashboard, go to Applications and select the Code42 app.
- On the Sign On tab of the Code42 app, click Edit.
- Copy the Identity Provider metadata link. You will need it in the next step.
- Next to Server URL, enter the entityID you recorded from Step 1.
- Click Save.
Step 4: Add Okta as an authentication provider
- Sign in to the Code42 console.
- Navigate to Administration > Integrations > Identity Management.
- Click Add Authentication Provider.
- In Display name, enter an identity provider name to display to users that sign in with SSO.
If your Code42 environment provides more than one SSO identity provider, users see a list of providers to choose from. They must select the provider configured for their Code42 organization. - In Provider's Metadata, ensure that Enter URL is selected and paste the URL for the identity provider metadata XML file.
- Click Create Provider.
Authentication provider settings appear.
Note the following message on the dialog:
This provider will not be applied to an organization until you update the organization security settings.
Do not apply this authentication provider to organizations yet. You will apply this provider to a test organization and to production organizations in later steps.
- (Optional) Code42 recommends using the default settings, but you can use Attribute Mapping to customize mappings between Code42 platform user attributes and authentication provider SSO assertion attributes.
- Click the Edit icon.
- Deselect Use default mapping.
- Configure mapping settings for each Code42 platform user attribute.
Each field supports up to 128 characters.- Username: Specify the SSO identifier or attribute that maps to the Code42 platform username.
- Select Use nameId to use the SSO name identifier.
- Select Use attribute tag to enter a custom SSO attribute.
- Email: Enter the SSO attribute that contains user email addresses.
- First Name: Enter the SSO attribute that contains user first names.
- Last Name: Enter the SSO attribute that contains user last names.
- Username: Specify the SSO identifier or attribute that maps to the Code42 platform username.
- Click Save.
- Click the Edit icon.
- (Optional) Local Users displays the current user. If there are any other users you want to exempt from using this authentication provider to log in, enter them here.
Step 5: Test SSO authentication
To avoid impacting your production environment, use a test organization to verify that SSO is working properly.
Step 6: Apply this provider to production organizations
Step 7: Add new users who sign in with SSO
- Assign the Code42 app to users or groups in the Okta dashboard. See Okta's documentation for more information.
- Ensure users are set up in Code42. You can add users manually with the Code42 console to an organization that uses SSO, or deploy Code42 apps to users in an organization that uses SSO. The users in Code42 must have first name, last name, and user name (email address) values that match the users' values in Okta.
You can also add new users to your Code42 environment using Okta's provisioning. See How to provision users to Code42 from Okta.
What to expect
Reduced authentication prompts
Lost access to an identity provider
External resources
- Wikipedia:
- Okta: Documentation