# Okta SAML (QUX)

{% hint style="warning" %}
**Please Note:**

This article is **ONLY** for customers configuring SAML SSO for **Quadrant UX (QUX)** deployments using Okta **as the IdP**.

If you are configuring Okta SAML for the Respond UX, please see [Okta SAML (RUX)](https://docs.vectra.ai/configuration/access/saml-sso-rux/okta-saml-rux) instead of this article.

While similar, there are some differences in the implementation for customers using the Respond UX. If you are unsure which UX you are using, please see: [Vectra Analyst User Experiences (Respond vs Quadrant) for more information](https://docs.vectra.ai/deployment/getting-started/analyst-ux-options-rux-vs-qux).

The Quadrant UX requires different SAML claim names than the Respond UX when setting up SAML 2.0 based SSO but the claim creation process in the IdP is similar.
{% endhint %}

## Introduction

* Customers can setup SSO federation to multiple SAML 2.0-based identity providers (IdP).
  * For most customers, only a single IdP is required.
* Once federated, already authenticated users will have one-click login in to the Vectra Quadrant UX.
* Unauthenticated users will get redirected to their IdP’s login portal.
* If multiple IdPs are configured, and the user is not already authenticated, the user will need to enter their email address so the domain name mapping can direct the user to the appropriate IdP.
* Features like password policies and multi-factor authentication will be enforced by the IdP.
* Once authenticated, users are assigned the Vectra role defined for their user or group in the IdP.
  * This will map to a role (and permissions) as defined in the Vectra Quadrant UX UI.

## Multiple SAML Profile Support

Vectra now supports multiple SAML profiles in private preview. Not all customers will require this, and NO changes are required for existing single IdP SAML configurations. If you are interested in this feature prior to it's planned general availability in the v9.10 release, please ask your Vectra account team.

{% hint style="info" %}
**Please Note:**

* Existing customers do **NOT** need to do anything if they will continue to only have a single SAML IdP configured.
* Any new profile that is added, for new or existing customers, will now need to have a **Domains** list configured as part of the Vectra SAML profile.
* If you add a 2nd profile to an existing deployment that did **NOT** have a **Domains** list configured previously, you **MUST** edit that existing profile to add the **Domains** mapping for that IdP.
* Nothing changes on the IdP side of the configuration.
* When multiple profiles are configured, users will be asked to enter their email address to be redirected to the appropriate IdP when they click **Login with SSO** on the Vectra login screen.
  {% endhint %}

## QUX SAML SSO - Notes of Interest

* **Please ensure the users are only mapped to one Vectra Role in the IdP.**
  * At this time, if a user is mapped to more than 1 role in the IdP, the user may not successfully log in with the desired role.
* IdP initiated flows are **NOT** supported.
  * While these flows may work, they are not recommended because they are highly susceptible to Man-in-the-Middle attack using stolen SAML assertions.
* The `SessionNotOnOrAfter` SAML parameter is supported to invalidate user sessions and require a user to re-authenticate.
* Single Log Out (SLO) and IdP initiated log out are **NOT** supported.
  * When a user logs out of the Quadrant UX, they are taken to a screen where they can log in locally or click a link to **Log in via SSO**.

<figure><img src="https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-c3455be19ad71725ab7b0cc0ea47b1f5fa2e064b%2F9c010e9fe101f9505d65aab3753357ab97072add384f3569620b994f0db96d9c.jpg?alt=media" alt="" width="280"><figcaption></figcaption></figure>

* At this time, a user who successfully authenticates through their IdP to Vectra will have a session that is good for one day.
* **Local login is still possible after SAML configuration:**
  * Construct a login URL as shown below.
  * `https//<ip_or_hostname>/accounts/login/?local=True`
* API keys are not supported for SAML users.
  * For API use, Vectra recommends local accounts authenticated locally or against external authentication sources such as RADIUS, LDAP, or TACACS+.
* Token Encryption is currently **NOT** supported.

## SAML Service Provider (SP) Initiated Flow

* This example flow diagram uses Azure as the IdP but SSO should work with any SAML 2.0 compliant IdP.
* Please note that all communication is brokered by the User Agent (user's browser). Vectra never needs to communicate with the IdP.

![](https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-ae2b8d1bb08be8cb845143dbd7a27c38de213bc8%2F646bda414d5f547c525e5c7c8dc6974b6b3fcff0532da96cb3313eef44964b58.png?alt=media)

## Configuration Steps

{% stepper %}
{% step %}

#### [Start SAML Profile Creation in Vectra UI](#id-1.-start-saml-profile-creation-in-vectra-ui)

This will allow you to retrieve the **SP ACS URL** and **SP Entity Identifier** for use in configuring the SAML app in Okta in the next step.
{% endstep %}

{% step %}

#### [Create SAML App in Okta](#id-2.-create-saml-app-in-okta)

Create the SAML App in Okta using the **SP ACS URL** and **SP Entity Identifier** you just retrieved in Step 1.

{% hint style="info" %}
**Please Note:**

* **Vectra SP ACS URL** = **Single sign-on URL** in Okta
* **Vectra SP Entity Identifier** = **Audience URI (SP Entity ID)** in Okta
  {% endhint %}
  {% endstep %}

{% step %}

#### [Add Required Attribute for the Vectra Role in Okta](#id-3.-add-required-attribute-for-the-vectra-role-in-okta)

In *Okta → Directory → Profile Editor*, choose your newly created app and add a required attribute for the Vectra Role to assign to your groups or users that you plan to allow logging in to the Vectra Quadrant UX.

* It is suggested to use **vectra\_role** for the variable name.
  {% endstep %}

{% step %}

#### [Add Attribute Statements in Okta for Use in SAML Assertion](#id-4.-add-attribute-statements-in-okta-for-use-in-saml-assertion)

In *Okta → Applications → Your newly created app → General → Edit SAML Settings*, add **Attribute Statements** for these **REQUIRED** attributes that Vectra **MUST** see in SAML assertions:

* `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name`&#x20;
  * Map to `user.email` in Okta.
* `https://schema.vectra.ai/role`
  * Map to `appuser.vectra_role` in Okta.
  * If you didn't use `vectra_role` as the variable name, use whatever variable name you created in step 3 but precede it by `appuser.` as in our example.
    {% endstep %}

{% step %}

#### [Assign Users or Groups to Your Okta SAML App](#id-5.-assign-users-or-groups-to-your-okta-saml-app)

In *Okta → Applications → Assignments*, assign users or groups to your newly created app.

* For each user or group you add, enter the standardized Vectra role name that you want to map to the user or group. This standardized name can be found in *Configuration → ACCESS → Roles* when on the edit screen for a role. &#x20;
* For example, the built in **Security Analyst** role has a standardized name of `security_analyst` :

<figure><img src="https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2FnSPkpbcv0FEKxmcJ8l2G%2Fimage.png?alt=media&#x26;token=0579da6e-972c-4587-8f45-6a03085e9303" alt="" width="563"><figcaption></figcaption></figure>
{% endstep %}

{% step %}

#### [Download SAML Metadata From Okta](#id-6.-download-saml-metadata-from-okta)

To complete the SAML profile in Vectra in the next step, download the SAML metadata XML file from Okta.
{% endstep %}

{% step %}

#### [Complete Vectra Configuration](#id-7.-completing-vectra-configuration)

To complete the SAML profile in Vectra, upload the SAML metadata you just downloaded from Okta in the Vectra SAML profile creation screen.

{% hint style="info" %}
**Please Note:**

At this point the Vectra configuration is complete.

If you need to login with a local user account after SSO is configured you can edit the URL you use to login to Vectra.

* Local user login that bypasses the SAML flow is still available by adding `/login/?local=True` to the end of your Quadrant UX login URL.
* An example looks like this: `https://[ip_or_hostname]/accounts/login/?local=True`
* It is recommended to warn any existing users that you will be implementing SSO and that local login will be available using the modified URL should any issues arise.
  {% endhint %}
  {% endstep %}
  {% endstepper %}

### 1. Start SAML Profile Creation in Vectra UI

* First we'll need to start creating the SAML Authentication Profile.
  * Additional profiles can be configured if multiple IdPs are required for your deployment.
* Open a new browser tab, log in as you normally do, and navigate to *Configuration → ACCESS → External Authentication.*
* Click on **Create** in the SAML Profiles section.

![](https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-43357412e28cf8704fae2292b03da1ee7ad5b647%2Fany-idp-saml-rux-2.jpg?alt=media)

* A dialog will open and the **SP ACS URL** and **SP Entity Provider** will be displayed there for entry into the corresponding fields in the IdP. Make note of these values for later use with your IdP. The SP is the Service Provider (your Vectra QUX deployment in this case).

{% hint style="info" %}
**Please Note:**

* Not every IdP uses the same terminology to refer to these fields.
* As an example, in Entra ID, Vectra's **SP Entity Provider** URI should be used for the Azure **Identifier (Entity ID)** and Vectra's **SP ACS URL** should be used for the Azure **Reply URL (Assertion Consumer Service URL)**.
  {% endhint %}

<figure><img src="https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fz1J1V6M7uPQtZa5WvE1M%2Fimage.png?alt=media&#x26;token=1980162a-d584-4bb1-b312-bdec313e3b6f" alt="" width="563"><figcaption></figcaption></figure>

* Leave this tab in your browser open and proceed in another tab or window to your IdP configuration so that you can configure the IdP side and retrieve the required metadata XML file needed to complete the Vectra configuration.

{% hint style="info" %}
**Please Note:**

If you want a hostname-based entry instead of IP-based entry for the **SP ACS URL** and **SP Entity Provider**, then you should:

* Configure in Vectra the Brain FQDN, in *Configuration → COVERAGE → Data Sources → Network → Brain Setup → Brain → DNS Name.*
* Check the **DNS Name** radio button for the **For linking in alerts/notifications (except AWS SecurityHub)** section.
* This will populate the SP entries using hostname instead of IP.

**Please Also Note:**

The **DNS Name** should be in lowercase in this area and any place you see it in your IdP.]
{% endhint %}

![Configuration → COVERAGE → Data Sources → Network → Brain Setup → Brain](https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-add172a937e809ffb6e191be256abdba6ae98c89%2F63ab184b40970e8c9b56862267b01c5df005f4f8573ae3ca9e96b474edbd3de3.jpg?alt=media)

### 2. Create SAML app in Okta

* Navigate in Okta to *Applications → Applications* and click on **Create App Integration**.

![](https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-32b695c919761f05c78f3196f1c32533367dbbd8%2F99d6db7617f6320fd75e2a97de344fd34476a449c28dca8e4d053b7159646e50.jpg?alt=media)

* Choose **SAML 2.0** and click **Next**.
* On the **Create SAML Integration** General Settings tab, enter a name for the application such as **Vectra Quadrant UX**.
* We've configure the App Visibility settings to not show the app to Okta users to discourage IdP initiated login attempts as they are not supported per the Notes of Interest earlier in this article.
* Once done filling in this page, click **Next**.

![](https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-a48decef4093cd25afa2ff412d0d5469a8151259%2Fdf1cefced28cfa5609ce22ec583d61ee0474a4d1a5c2df2ccf95a4865f9bf8a4.jpg?alt=media)

* On the **Configure SAML** tab enter the **SP ACS URL** and **SP Entity Provider** you retrieved from Vectra earlier as follows:
  * **SP ACS URL** = **Single sign-on URL** in Okta.
  * **SP Entity Identifier** = **Audience URI (SP Entity ID)** in Okta.
* All other settings on this page can be left at their defaults.
* Click **Next** at the bottom of the page.

![](https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-e12acacb12905e4535062465166c7abbf965c6d8%2F508ec5f76f5ce5d490c6ea6c7208f3d549db3740b0ceb31ef025821f3633aeed.jpg?alt=media)

* On the final **Feedbac**k tab, enter what you wish to provide feedback to Okta and click **Finish**.

### 3. Add Required Attribute for the Vectra Role in Okta

Now we need to create a new Okta directory profile attribute for your SAML app you just created. This new attribute will hold the Vectra Role and is required.

* In Okta, navigate to *Directory → Profile Editor → Your new app* and click **+ New Attribute**.
  * Data type: String (default).
  * Display name: **Vectra Role** or whatever you want to call the attribute.
  * Variable name: `vectra_role` or whatever you want to call the variable.
  * Description: enter an optional description.
  * Attribute required: Yes
  * All other field can be left at their defaults.
* Click **Save**.

<figure><img src="https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-c6974c9031734f2b3eb247a93e261cbd01ba1158%2Faef36f25630d8c3515bcf28cc1b6d490dc879f888b70d439e362209fb461fd54.jpg?alt=media" alt="" width="563"><figcaption></figcaption></figure>

### 4. Add Attribute Statements in Okta for Use in SAML Assertion

Vectra requires specific attributes in the SAML assertion and Okta needs to be configured for these in your newly created SAML app.

* In *Okta → Applications → Your newly created app → General → Edit SAML Settings*, add **Attribute Statements** for these **REQUIRED** attributes that Vectra **MUST** see in SAML assertions:
  * `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name`&#x20;
    * Map to `user.email` in Okta.
  * `https://schema.vectra.ai/role`
    * Map to `appuser.vectra_role` in Okta.
    * If you didn't use `vectra_role` as the variable name, use whatever variable name you created in step 3 but precede it by `appuser.` as in our example.
* These should be added to the **Attribute Statements (Optional)** area, **not** the **Group Attribute Statements (Optional)** area below that.
* Click **Next** and then **Finish** on the next screen.

![](https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-d0577013c4bd561089f5efe31b4adddb5fcf1c9b%2Fd884cb1f9874b3f4a4f94318fcea4a627da886e2d5582e1092209ef228604aab.jpg?alt=media)

### 5. Assign Users or Groups to Your Okta SAML App

Existing Okta users or groups can be assigned to the app. Since we now have a required attribute that doesn't normally exist in the Okta directory added to the app, when the user or group is assigned to the app, Okta will prompt you to enter the Vectra Role (only input the standardized role name (see below) from Vectra) that you want assigned to that user or group.

#### Vectra Standardized Role Names (Required)

* Later portions of this overall step will require the Vectra Standardized Role Name.
* To see the standardized role names in the Vectra Quadrant UX, navigate to the *Configuration → ACCESS → Roles* screen.
* Click on each role that your SAML users will be using and make note of the specific **Standardized Name** for each role.
  * For example, the **Security Analyst** role has a **Standardized Name** of `security_analyst` .

![](https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-adcb9ffbc5018c0a4d724bf9be5ce4ddf4a0a171%2Fokta-saml-qux-9.jpg?alt=media)

* Default standardized role names are as follows:
  * `admins`
  * `read_only`
  * `restricted_admins`
  * `security_analyst`
  * `setting_admins`
  * `super_admins`

{% hint style="info" %}
**Please Note:**

Only a single value is accepted for the Role on the Vectra side when the SAML assertion is presented by the user agent.

* If multiple roles are sent, the 1st one Vectra sees will be assumed to be the correct role to map the user to.
  {% endhint %}

#### Okta Users and Groups - Utilizing existing or creating new and assigning to the SAML app

* If you wish to use existing users and groups that already exist in Okta to determine which users will get access to Vectra, that is fine.
* To create new users or groups in Okta specifically for use with the Vectra Quadrant UX, simply create those users or groups as you usually do in Okta.
* Now we will move on to assigning the users or groups to the SAML app. This will cause Okta to ask for the Vectra Role (using the Standardized Role Name).
* The process to add a user to the application is essentially the same as adding a group but you operate on the user object instead of the group.
  * In our example below we will use a group.
* In Okta, navigate to *Applications → Applications → Your SAML app* and click **Assign** and then **Assign to Groups**.

![](https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-ee43b810c805c5783d4478d9fde4bf9f44d6cc80%2F71e87e466eba3b68c00b981f75a49d9a95b4e73c6ff8aba0852d688fb2b182ce.jpg?alt=media)

* In the pop up window that follows, select your group that you wish to assign to the SAML application.
* In our case, we have pre-created a **Super Admins** group that we wish to use for our Vectra Super Admins.
* Click **Assign** on the Okta group.

![](https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-6c52cb3784c92604f043751f3712e0db33e96833%2Fd3ea7144219f918b711760c420e594bc309cc78a8286c5f7309398f7d9b345a0.jpg?alt=media)

* Input the Vectra **Standardize Role** name you collected earlier in this overall step.
* You **MUST** put the **Standardized Role** name in exactly as you saw it in Vectra.
* In our example, we are inputting `super_admins`.
* Click **Save and Go Back**.

![](https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-624685b2a270475634fb812ecddb689d8004ba18%2F0a5c72364557d9c7a7a13c8ded6887a0a9877b5c0e53bc5a43982ea758f310d0.jpg?alt=media)

* Complete this same process for any remaining Groups or Users you wish to assign to the SAML application.

### 6. Download SAML Metadata From Okta

Vectra needs an XML SAML Metadata file from your Okta SAML app that includes the signing certificate to be able to complete the SAML profile in Vectra.

* In Okta, navigate to *Applications → Applications → Your SAML app* and click on the **Sign on** tab of you SAML app.
* Scroll down to the **SAML Signing Certificates** area and click on **Actions** on the right and then click on **View IdP metadata**.

<figure><img src="https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-de97e03e88bebb88855871bda6a43657d7e71cf6%2Ff953fe8985a611db07f5c32b8ec79146c6497c8aa496c7224f3aa50bd821159e.jpg?alt=media" alt="" width="563"><figcaption></figcaption></figure>

* On the web page that opens in a new tab you will see the IdP metadata.
* Use your web browsers option that allows you to save the page, and save the contents to a filename of your choice.
  * This data should download as a .xml file.

![](https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-4b4b7bc819e8666fad1ed08b5134862461913ee0%2Fb5e1d2994eac6f2b26f45d92d4eeea886ed8b9daa86ae5d089e6166cf05eaffc.jpg?alt=media)

* After downloading the IdP Metadata you can complete the configuration back in the Quadrant UX.

### 7. Completing Vectra Configuration

* After IdP configuration and downloading the IdP Metadata XML file you can complete the configuration in the Vectra UI.
* Click **Select a file** next to **Upload IDP Metadata XML File** in the **Create SAML Profile** window.
* Fill in the **Profile Name** with a name.
* Fill in the **Domains** field with the domains that should map to the SAML IdP you are configuring.
  * For example, if you username is `user@company.com`, then you would enter `company.com`.
  * When multiple SAML profiles are configured, users will enter an email address after clicking **Login with SSO**.
  * Based on the user input and mapped domains, the user will be redirected to the appropriate IdP for authentication and then redirected back to Vectra with a SAML assertion.
* Click **Create.**

<figure><img src="https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2FkXLRUAFA2UV7Atajiku3%2Fimage.png?alt=media&#x26;token=a9d4d9ab-aea4-4886-bff1-0e76d5521083" alt="" width="375"><figcaption></figcaption></figure>

## Testing

* Once configuration is complete on both the Service Provider (Vectra) and IdP side, you are ready to test SAML SSO to Vectra.
  * Keep in mind that only users and groups who are mapped to standardized Vectra role names in your IdP will succeed.
* Click the **Login with SSO** button on the login page for your Vectra QUX deployment.

<figure><img src="https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2FG2AmR83b8uTqYnRnoEra%2Fimage.png?alt=media&#x26;token=cd8681ff-89c5-44c0-97de-b73e89fe63d6" alt="" width="375"><figcaption></figcaption></figure>

* If you are already authenticated to your IdP, and have a mapping to a standardized role that exists in Vectra, you should be logged in without requiring any additional steps.
* If you are need to authenticate to your IdP, you will be asked for a email address when multiple profiles are configured and redirected to your IdP for authentication and then redirected back to Vectra and presented the UI with your mapped role permissions applied.

<figure><img src="https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-4640c6d79a875d69eb1ff1761b76e16ae9c2e0cf%2Fany-idp-saml-rux-9.jpg?alt=media" alt="" width="375"><figcaption></figcaption></figure>

{% hint style="info" %}
**Please Note:**

After SAML configuration, local login using username/password is still supported via a different URL constructed as follows:

* `https//<ip_or_hostname>/accounts/login/?local=True`

* For users not participating in SSO, please ensure they have this new URL to login to Vectra.
  {% endhint %}

* After login, you can see your status under *My Profile.*

![](https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-7a0f9ecdc61c3bc588f6aba0d1ca6c480d15b3da%2F7d2ce171c4b24bf5da1e21c41cd5a67ae04a07e09977c419d115971930c253e6.jpg?alt=media)

* If you have rights to the *Configuration → ACCESS > Users* screen, you can see all user logins.
  * SAML users are shown with a `SAML:` prefix.
  * SAML users are not locally defined in your Vectra deployment, they exist in the IdP and the configuration allows them to login to your Vectra deployment.

<figure><img src="https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2FCSAsxrmET8WXZ2dYn2NH%2Fimage.png?alt=media&#x26;token=f43cc6eb-ce1b-4e1a-a6ea-0efbadfe0a23" alt=""><figcaption></figcaption></figure>

## Video Demo of Logging in to Okta via SAML SSO

{% embed url="<https://vimeo.com/480535157/9008e0c629>" %}
