Set up Okta for SSO using SAML
Learn how to setup Okta as a custom external identity provider for SSO with Endor Labs
Single Sign-On (SSO) provides a seamless sign-in by enabling users to access external applications and services without re-entering the credentials. Endor Labs supports SAML or OIDC-based identity providers.
SAML is an XML-based protocol used for exchanging authentication and authorization data between applications.
OpenID Connect (OIDC) is an identity layer on top of the OAuth 2.0 framework that allows applications to verify the identity and claims of users.
Using Endor Labs, you can integrate using an Identity Provider (IdP) that supports SAML or OIDC, such as Okta, Microsoft Active Directory Federation Services (AD FS), Azure Active Directory (AD), Google, or OneLogin.
To integrate an SSO-based identity provider with Endor Labs:
To configure Endor Labs as a SAML 2.0 app, you must have the following service provider details:
https://api.endorlabs.com/v1/auth/saml-callback?tenant=yourtenant
Replace yourtenant
with your actual tenant name.https://api.endorlabs.com/v1/auth/sso
To configure Endor Labs as an OIDC app, you must have the following service provider details:
https://api.endorlabs.com/v1/auth/oidc/callback
https://api.endorlabs.com/v1/auth/oidc/logout
The following information is needed for SAML and OIDC configuration setup in Endor Labs.
To set up SAML SSO with Endor Labs you will need the following information from your IdP:
To set up OIDC SSO with Endor Labs you will need the following information from your IdP:
Provide the Identity Provider SSO details in Endor Labs and allow users to seamlessly and securely sign in to Endor Labs.
Sign in to Endor Labs.
From the sidebar, navigate to Settings and click CUSTOM IDENTITY PROVIDER.
Select the TYPE OF IDENTITY PROVIDER as SAML.
Enter a name for your IDENTITY PROVIDER NAME.
From METADATA DEFINITION, select Metadata URL and enter the SAML Identity provider metadata URL or Discovery URL from your IdP.
If you want to enter the identity provider details manually, choose METADATA DEFINITION as Manual and enter the following details that you saved from IdP.
Click Save Configuration.
Provide the following Identity Provider SSO details to configure OIDC SSO in Endor Labs and allow users to seamlessly and securely sign in to Endor Labs.
Note: Based on your IdP configuration you may need additional claim names or scopes. Consult your IdP administrator for additional guidance.
Once you’ve configured your custom identity provider in Endor Labs you must setup an authorization policy for your users and groups.
To configure an authorization policy:
Use the user account to sign in to Endor Labs from your IdP and validate the SSO integration.
For Okta-specific instructions, see SSO using Okta
Learn how to setup Okta as a custom external identity provider for SSO with Endor Labs
Learn how to setup Okta as a custom external identity provider for SSO with Endor Labs
Was this page helpful?
Thanks for the feedback. Write to us at support@endor.ai to tell us more.
Thanks for the feedback. Write to us at support@endor.ai to tell us more.