![]() ![]() Make sure you are logged in to the admin portal. Log in to Okta web console with admin credentials. Steps to set up a SAML application in Okta In this section we have covered the configuration steps forĪ. Step 2: Setting up an SAML application in the Identity Provider Use the newly generated ACS URL/Recipient URL or the SP Metadata file to create a new SAML configuration for ADSelfService Plus in your identity provider.Ĭlick Save, and the new ACS/Recipient URL will be generated. When you select the Create a new SAML SSO checkbox, you can maintain a separate SAML configuration for multi-factor authentication by generating a new ACS URL/Recipient URL and SP Metadata file. ![]() Click Modify, if you have already configured.īy default, ADSelfService Plus utilizes the same SAML authentication configuration for multi-factor authentication during password self-service and single sign-on (SSO) during login. This means that the MFA SAML configurations will automatically be reflected on the logon SSO settings, if the latter is enabled. Navigate to Configuration tab → Self-Service → Multi-factor Authentication → Authenticators Setup.Ĭlick SAML Authentication section. Log in to ADSelfService Plus web console with admin credentials. Step 1: Service Provider Configuration (ADSelfService Plus) ![]() Log in to your identity provider application web console with admin credentials and navigate to ADSelfService Plus from the list of applications provided.Įither download the Metadata in XML format, or get the required data by copying the Issuer URL/Entity ID, IdP Login URL, and the X509-certificate. For other identity providers, contact their support team for further assistance. Find the steps to add a new application in Okta, OneLogin, ADFS and Line Works by clicking on the respective links. If it is not supported by default, you can add ADSelfService Plus as a new application in your identity provider. ![]() The SAML-based identity provider that you intend to use must have ADSelfService Plus as one of its SAML-supported applications. Click ACS URL/ Recepient URL and the Relay State. Navigate to Configuration tab → Self-Service → Multi-factor Authentication → Authenticators Setup → SAML authentication. Log in to ADSelfService Plus web console as an administrator. Note: SAML authentication cannot be used to perform user identification through the ADSelfService Plus mobile app during self-service actions. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
December 2022
Categories |