Single Sign-On configuration in Opkey- New UI

Single sign-on (SSO) is an authentication method that allows users to securely access multiple applications and websites with a single set of credentials. 

Configuring Single Sign-On (SSO) in Opkey is a hassle-free process. This setup is a one-time task that ensures seamless SSO functionality thereafter. 

SSO Configuration Process 

Note: This setup is for IDP-initiated Single Sign-On (SSO). 

Step 1: Receive Information from Opkey 

We will provide you with the following details that need to be entered into your SSO application, for example, Okta, ADFS, JumpCloud, etc. 

A) Redirect URI 

B) Service Provider Entity ID: 

C) Logout URL: 

  1. Attributes (With Name Format Basic): 

  • FirstName (value: user.firstName) 

  • Lastname (value: user.lastName) 

  • Email (value: user-email) 

  1. Group Attribute: 

  • idp_Groups (Name Format: Unspecified, Filter: Matches regex:*) 


Step 2: Configure Your SSO Application 

  • Use the provided information to configure your SSO application. 

  • Once configured, your application will generate a metadata file. 


Step 3: Provide Metadata URL or Necessary Information to Opkey 

  • Send the metadata URL generated by your application to us. 

  • Alternatively, you can provide the following necessary information: 

  • Identity Provider Entity ID 

  • Single Sign-On Service URL 

  • NameID Policy Format 


We will use this metadata URL or the necessary information to complete the SSO setup on our end. 

Completion and Testing 

Verification 

  • After we receive the metadata URL, we will configure and verify the SSO settings on Opkey. 

  • We will perform initial tests to ensure the configuration is correct. 


Client Verification 

  • We will notify you to perform your verification tests. 

  • Once you confirm everything is working as expected, the SSO setup will be considered complete. 



SSO Groups


The newly updated SSO group feature will enable all the users added to the group to enjoy the same admin or common user privileges assigned to them by their admin. This will save the hassle of providing separate access to all the team members working on a project. 


Let's look at the steps tp follow.


Once the SSO configuration has been done, click on Add Group. 

Select the Allow Opkey Login for

Only Group Members - Only the group members will be allowed access.

All Single-Sign On Members - All members with single sign configuration will be allowed access.


Enter the SSO provider for example Okta, ADFSetc.

Select the Group created during the SSO configuration set-up.

Select Project for example Project Sanity test


Click Add. Check the Opkey Admin checkbox if you want to give admin access to all group members. Here we haven't checked.


A new group gets created.



 This brings us to an end of this article.

 

 

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article