Okta SSO Integration
The Infracast Okta integration enables Single Sign-On (SSO) so your users can log into Infracast using their existing Okta credentials. Both SAML 2.0 and OIDC (OpenID Connect) are supported. When SSO is enabled, users are redirected to Okta for authentication and returned to Infracast with an active session.
Prerequisites
- An Okta tenant with administrator access
- Infracast tenant admin access
- Your Infracast instance URL (e.g.,
https://infracast.example.com)
Option A: SAML 2.0 Configuration
Step 1: Create an Okta SAML Application
-
Log into the Okta Admin Console
-
Navigate to Applications → Applications → Create App Integration
-
Select SAML 2.0 → Next
-
General Settings:
- App name:
Infracast - App logo: (optional)
- App name:
-
Configure SAML:
- Single sign-on URL:
https://infracast.example.com/auth/saml/callback - Audience URI (SP Entity ID):
https://infracast.example.com/auth/saml/metadata - Name ID format:
EmailAddress - Application username:
Email
- Single sign-on URL:
-
Attribute Statements: Add the following:
Name Value emailuser.emailfirstNameuser.firstNamelastNameuser.lastNamegroupsuser.groups(optional, for group-based role mapping) -
Click Next → Finish
-
On the Sign On tab, click View SAML setup instructions and note:
- Identity Provider Single Sign-On URL
- Identity Provider Issuer
- X.509 Certificate (download)
Step 2: Configure Infracast SAML
Navigate to Settings → Integrations → Add Integration → Okta SSO → SAML:
| Field | Value |
|---|---|
| SSO URL | Okta Identity Provider Single Sign-On URL |
| Entity ID (Issuer) | Okta Identity Provider Issuer URL |
| X.509 Certificate | Paste the downloaded certificate content |
| Email Attribute | email |
| First Name Attribute | firstName |
| Last Name Attribute | lastName |
| Groups Attribute | groups (optional) |
Option B: OIDC Configuration
Step 1: Create an Okta OIDC Application
- Log into the Okta Admin Console
- Navigate to Applications → Applications → Create App Integration
- Select OIDC - OpenID Connect → Web Application → Next
- General Settings:
- App integration name:
Infracast
- App integration name:
- Sign-in redirect URIs:
https://infracast.example.com/auth/oidc/callback - Sign-out redirect URIs:
https://infracast.example.com/auth/logout - Assignments: Assign the app to the appropriate groups or users
- Click Save
- Note the Client ID and Client secret from the app's General tab
- Note the Okta domain (e.g.,
yourcompany.okta.com)
Step 2: Configure Infracast OIDC
Navigate to Settings → Integrations → Add Integration → Okta SSO → OIDC:
| Field | Value |
|---|---|
| Issuer URL | https://yourcompany.okta.com (or https://yourcompany.okta.com/oauth2/default for a custom authorization server) |
| Client ID | OIDC application Client ID |
| Client Secret | OIDC application Client Secret |
| Scopes | openid profile email groups |
| Redirect URI | https://infracast.example.com/auth/oidc/callback |
Role Mapping
Infracast roles can be mapped from Okta groups, so users automatically receive the correct Infracast permissions based on their group membership.
| Okta Group | Infracast Role |
|---|---|
infracast-admins | Admin |
infracast-analysts | Analyst |
infracast-viewers | Viewer |
Configure group-to-role mappings in Settings → Integrations → Okta SSO → Role Mappings.
User Provisioning
When a user authenticates via SSO for the first time, Infracast creates their account automatically (Just-In-Time provisioning). The account is assigned the default role configured in Settings → SSO → Default User Role.
Infracast does not currently support SCIM-based user provisioning from Okta. Users are created on first login and deprovisioned by disabling or removing them from the Okta application assignment.
Troubleshooting
SAML response validation failed
Symptom: Login redirects to Okta but returns to Infracast with a SAML error
Checks:
- Verify the Single sign-on URL in Okta matches exactly:
https://infracast.example.com/auth/saml/callback - Verify the Audience URI matches:
https://infracast.example.com/auth/saml/metadata - Confirm the X.509 certificate in Infracast is the full certificate including
-----BEGIN CERTIFICATE-----headers - Check that system clocks are synchronized — SAML assertions expire after a short window (clock skew > 5 minutes causes failures)
Invalid client (OIDC)
Symptom: OIDC login fails with invalid_client
Checks:
- Verify the Client ID and Client Secret are copied correctly (no trailing spaces)
- Verify the redirect URI in Okta matches exactly:
https://infracast.example.com/auth/oidc/callback - Ensure the app is assigned to the user's groups in Okta
Users can log in but have no access
Symptom: SSO login succeeds but user sees "Access Denied" in Infracast
Cause: No role mapping matched, and the default role may be set to None.
Fix: Configure a default role in Settings → Integrations → Okta SSO → Default User Role, or add the user's Okta group to the role mappings.
Okta app not visible to users
Symptom: The Infracast tile does not appear in users' Okta dashboard
Checks:
- Verify the Okta application assignment includes the user's group or individual user
- In Okta Admin Console: Applications → [Infracast] → Assignments — confirm users/groups are assigned