First need to login to Okta with an administrative user and navigate to the Applications section. Click the Create App Integration button.
If prompted select SAML 2.0 and click Next.
The general settings for this new application are unique to your Okta account and do not effect the integration; choose a name that you can simply identify later on. Select Next once you’ve filled out the form.
Now you’ll be asked to enter the SAML settings; both the SSO URL and Audience URI should be set to https://[youraccount].status.page/sso/saml. Set the Name ID Format to EmailAddress and the Application username to Email. Select Next once you’ve filled out the SAML settings.
Lastly Okta will prompt you if you’re a customer or partner; select the customer option, the rest of the form is optional. To complete the Okta Application setup select Finish.
You should now be viewing the application in your Okta account. Here you can grant users and groups access to this application within your account. To complete the integration you’ll have to activate it within StatusCast but before you log out of Okta you’ll need two bits of info from the newly created application.
Navigate to the Sign On tab in the application, and you should see the notice that “SAML 2.0 is not configured until you complete the setup instructions.” Click the View Setup Instructions button which will open a new tab/window. Keep this open as you will need to copy a few things into StatusCast.
In a new tab or window log into your StatusCast admin portal. Navigate to the Integrations section by clicking Settings > Integrations. Under the SSO card select the Install option. (https://[yourapp].status.page/admin/integrations/sso)
To complete the integration select the role you want to assign users first. You can assign user roles to allow permissions to view or access specific component data. You should go through this process for each role you will be using Okta for authentication in Statuscast
- Use the dropdown menu to choose Okta as the SSO provider
- Enter your App ID for Statuscast found in Okta
- Enter the SSO Target URL unique the Okta App which you can find in the setup instructions labeled as your Identity Provider Single Sign-On URL.
- Paste a copy of your X.509 Certificate into appropriate field in StatusCast.
- Select Install to save your configuration.
Now you’re Okta integration is complete and the users you granted access to can sign into StatusCast using their SSO credentials.
The URL paths for each of the roles are listed below:
Subscriber > https://[yourapp]status.page/login
Manager > https://[yourapp]status.page/login/manager
Administrator > https://[yourapp]status.page/login/admin
Company Administrator > https://[yourapp]status.page/login/companyadmin
Updated 14 days ago