多维表格
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

2.5 KiB

title description tags keywords
Okta Learn how to configure Okta as an identity provider for NocoDB. [SSO Okta SAML] [SSO Okta SAML Authentication Identity Provider]

This article briefs about the steps to configure Okta as Identity service provider for NocoDB

NocoDB, Retrieve SAML SSO Configuration details

  1. Go to Account Settings
  2. Select Authentication (SSO)
  3. Click on New Provider button
  4. On the Popup modal, Specify a Display name for the provider; note that, this name will be used to display the provider on the login page
  5. Retrieve Redirect URL & Audience / Entity ID; these information will be required to be configured later with the Identity Provider

SAML SSO Configuration SAML SSO Configuration SAML SSO Configuration

Okta, Configure NocoDB as an Application

  1. Sign in to your Okta account
    • Navigate to Applications > Applications
    • Click Create App Integration
  2. In the pop-up with title Create a new app integration choose SAML 2.0 as the Sign-in method
  3. On the Create SAML Integration page, in the General settings - provide a name for your app; click Next
  4. In the Configure SAML section:
    • Enter the Redirect URL copied from NocoDB in the Single sign-on URL field.
    • Add the Audience URI copied from NocoDB in the Audience URI (SP Entity ID) field.
    • Choose Email Address from the Name ID format options.
    • Select Email from the Application user-name options.
    • Click Next
  5. Complete any additional information in the final step and click Finish
  6. On your application's homepage,
    • Navigate to the Sign-on tab
    • Copy the Metadata URL from the SAML 2.0 section
  7. Go to the Assignments tab and click Assign to assign people or groups to this application.

NocoDB, Configure Okta as an Identity Provider

  1. Go to Account Settings > Authentication (SSO) > SAML
  2. On the "Register SAML Identity Provider" modal, insert Metadata URL retrieved in step above; alternatively you can configure XML directly as well
  3. Save

SAML SSO Configuration

For Sign-in's, user should be able to now see Sign in with <SSO> option.

SAML SSO Configuration

:::note Post sign-out, refresh page (for the first time) if you do not see Sign in with <SSO> option :::