Okta Identity Provider (SAML)

his article walks you through configuring Okta for use as an identity provider for Perimeter 81. You will need to follow the two steps -

  1. Configure Okta
  2. Configure Perimeter 81

1. Configure Okta

  1. Log in to your Okta account. If you don't already have one, you will need to create one.

  2. On the general Okta dashboard, click Admin. This takes you to the Okta Admin Dashboard.

  1. Using the list of shortcuts at the right-hand side of the screen, click Add Applications.
  1. On the Add Application page, select Create New App.
  1. On the Create a New Application Integration pop-up window, select web as the Platform for your application, and choose SAML 2.0 as the Sign on method. Click Create to proceed.

You will now create your SAML integration. On the General Settings page, provide the following:

  • App name: Perimeter 81
  • App Logo: (Optional)
  • App visibility: select whether you want your users to see your application icon and in what settings.

Click Next to proceed

Next, you will see the SAML Settings page. Enter the following values into the appropriate fields:

Single sign on URL: https://auth.perimeter81.com/login/callback?connection={{WORKSPACE}}-oc
For example https://auth.perimeter81.com/login/callback?connection=myworkspacename-oc

Audience URI (SP Entity ID): urn:auth0:perimeter81:{{WORKSPACE}}-oc

For example: myworkspacename.perimeter81.com workspace should translate to

You will also need to add the following Attributes Statement:

  • Name: email
  • Name format (optional): Unspecified
  • Value: ${user.email}
  • Name: given_name
  • Name format (optional): Unspecified
  • Value: ${first.Name} untitled__4_.png
  • Name: family_name
  • Name format (optional): Unspecified
  • Value: ${last.Name}untitled__3_.png
  • Name: groups
  • Name format (optional): Unspecified
  • Filter type: Regex
  • Value: .*
  • Name: groups
  • Name format (optional): Unspecified
  • Filter type: Regex
  • Value: .*

At this point, you can click Preview the SAML Assertion to generate XML you can use to verify that your provided settings are correct.

Click Next to proceed.

Lastly, answer Are you a customer or partner? by selecting I'm an Okta customer adding an internal app. Click Finish.

You'll be directed to the Sign On page for your newly-created app.

Click on Assignment to create either groups or individual assignment from your Identity Provider to the application. (this will determine who can access Perimeter 81).

Click on Sign On and then View Setup Instructions to complete the process.

Take note of the Identity Provider Single Sign-On URL, and copy of the X.509 certificate.


2. Configure Perimeter 81

At this point, you will configure the integration from the Perimeter 81 side.

  1. Log in to your Perimeter 81 management dashboard, and navigate to Settings -> Security.

  2. Click + Add Provider

  3. Choose Okta Identity Cloud

  4. Fill Sign In URL, Signing Certificate

  5. Add your organisation domain

  6. Paste the certification from OKTA

  1. Click Done.

4. Access Error troubleshooting

If your users are getting access error after the configuration ,please check these steps.

0 out of 0 found this helpful



Please sign in to leave a comment.