Okta as IdP for wordpress

WordPress SAML SP Single Sign-On (SSO) plugin gives the ability to enable SAML Single Sign-On (SSO) for your WordPress sites. Our plugin is compatible with all the SAML compliant Identity providers. Here we will go through a step-by-step guide to configure SSO between WordPress site and Okta by considering Okta as IdP.

miniorange img Pre-requisites : Download And Installation

To configure Okta as SAML IdP with WordPress, you will need to install the miniOrange WP SAML SP SSO plugin:

Step-by-step Video to Setup SSO between WordPress and Okta

Step 1: Setup Okta as Identity Provider

Follow the steps below to configure Okta as IdP

miniorange img Configure Okta as IdP

  • In the miniOrange SAML SP SSO plugin, navigate to Service Provider Metadata tab. Here, you can find the SP metadata such as SP Entity ID and ACS (AssertionConsumerService) URL which are required to configure the Identity Provider.
  • WordPress SAML Single Sign-On (SSO) upload metadata
  • Log in to your Okta dashboard.
  • You will be presented with following screen. Click on Developer Console arrow and select Classic UI from the navigation bar on top.
  • SAML Single Sign-On (SSO) using Okta as Identity Provider(IdP), Okta SSO Admin_Dashboard
  • Go to Applications -> Applications.
  • SAML Single Sign-On (SSO) using Okta as Identity Provider(IdP), Okta Login - add_application
  • You will get the following screen. Click on Add Application button.
  • SAML Single Sign-On (SSO) using Okta as Identity Provider(IdP), Okta Login - SAML 2.0 Configure
  • Now,click on Create New App button to create an app.
  • SAML Single Sign-On (SSO) using Okta as Identity Provider(IdP), Okta Login - SAML 2.0 Configure
  • Choose Web as platform, SAML 2.0 as Sign on method and click on Create button.
  • SAML Single Sign-On (SSO) using Okta as Identity Provider(IdP), Okta Login - SAML 2.0 Configure
  • In General Settings, enter App Name and click on Next button.
  • SAML Single Sign-On (SSO) using Okta as Identity Provider(IdP), Okta Login - SAML_SETTINGS
  • In SAML Settings, enter the following:
  • Single Sign On URL Enter ACS (AssertionConsumerService) URL from the Service Provider metadata tab of the module.
    Audience URI (SP Entity ID) Enter SP Entity ID / Issuer from the Service Provider Metadata tab of the module.
    Default Relay State Enter Relay State from the Service Provider Metadata tab of the module.
    Name ID Format Select E-Mail Address as a Name Id from dropdown list.
    Application Username Okta username.
    SAML Single Sign-On (SSO) using Okta as Identity Provider(IdP), Okta Login - SAML_SETTINGS
  • Configure Group Attribute Statement (Optional) and click on Next button.
  • SAML Single Sign-On (SSO) using Okta as Identity Provider(IdP), Okta Login - Add_Attributes
  • If you have integrated your Active Directory in Okta and want to map the AD groups, please make sure that you have added the OUs used to import groups.You will also need to map the memberOf
    attribute under the integrated directory’s configuration.

miniorange im

g Assigning Groups/People

  • Go to created application and click on the Assignment Tab in Okta.
  • SAML Single Sign-On (SSO) using Okta as Identity Provider(IdP), Okta Login - Assign_groups
  • Here, we select the peoples and groups you want to give access to log in through this app.
  • SAML Single Sign-On (SSO) using Okta as Identity Provider(IdP), Okta Login - Assign_groups
  • Click on Assign and then click on Done button.
  • SAML Single Sign-On (SSO) using Okta as Identity Provider(IdP), Okta Login - Assign_groups
  • After assigning the people/groups to your app, go to Sign On tab and Click on View Setup Instructions to get the SAML Login URL (Single Sign on URL), Single Logout URL, IDP Entity ID and X.509 Certificate. You will need this to configure the Service Provider.
  • SAML Single Sign-On (SSO) using Okta as Identity Provider(IdP), Okta Login - Assign_groups
Hello there!

Need Help? We are right here!

support
Contact miniOrange Support
success

Thanks for your inquiry.

If you dont hear from us within 24 hours, please feel free to send a follow up email to info@xecurify.com