CISO Assistant
  • 👋Welcome to CISO Assistant
  • Guide
    • Installation
    • Understanding decoupling
    • General tips
    • Journeys
    • 🏗️Creating your first perimeter
    • ✅Creating your first Audit
    • 📊Creating your first risk assessment
    • 🔎Overview
    • 🧰Extra tools
    • 🌐External resources
    • Understand mapping
    • Glossary
    • Data import wizard
  • Features highlight
    • Controls autosuggestion
    • Multi-level support
    • Flash mode
    • Evidences from clipboard
    • Library upgrade
    • Mapping explorer
    • SSO
      • Microsoft Entra ID
      • Okta
      • Keycloak
      • Google Workplace
    • Setting up Multi-Factor Authentication (MFA)
  • Model
    • 📁Organization
      • Add and manage users
      • User Groups
    • ⚙️Context
    • 🏛️Governance
    • 💣Risk
    • 📋Compliance
  • Deployment
    • Prerequisites
    • Local
    • Remote/Virtualization
    • Deploy on a VPS
    • Frequent questions
    • Setting up mailer
    • Updating your local instance
    • Helm Chart
    • Special cases
    • Upgrading a library
  • ✨Customization
    • Getting your custom framework
    • CIS Controls
    • Changing the language
  • Contributing
    • Internationalization
      • Translating the interface
    • Submit a library
  • Academy
    • Overview
    • Third Parties Risk Management
    • Etude EBIOS RM
Powered by GitBook

Community

  • Github
  • Discord

intuitem

  • Home
  • SaaS trial

© intuitem, 2018-2024

On this page

Was this helpful?

Export as PDF
  1. Features highlight
  2. SSO

Okta

Configure Okta as an Identity Provider for CISO Assistant

PreviousMicrosoft Entra IDNextKeycloak

Last updated 8 months ago

Was this helpful?

Go into your Okta admin console (it should look like this: https://<your_url>.okta.com/admin/dashboard)

  1. In the sidebar menu, click on Applications > Applications

  2. Click now on Create App Integration

  3. Select SAML 2.0 and click on Next

  4. Choose an App name and click on Next

  5. Add the Single sign-on URL: <base_url>/api/accounts/saml/0/acs/ (for example with localhost: https://localhost:8443/api/accounts/saml/0/acs/) (see screenshot below)

  6. Add the Audience URI (SP Entity ID), it has to be the same than SP Entity ID in CISO Assistant (see screenshot below)

  7. Choose Email as the Application username

  8. Add Attribute Statements

    • http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname for user's first name

    • http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname for user's last name

  9. Click on Next and fill in the Feedback page as you wish then click on Finish

  10. In the Settings box inside SAML 2.0:

    • Copy the Metadata URL and paste it into the Metadata URL field in CISO Assistant

    • Copy the Issuer url and paste it into the IdP Entity ID field in CISO Assistant

  11. Go to the Assignments tab

  12. Click on Assign and choose whether you want to assign users or specific groups

Add a user in your application doesn't automatically create the user on CISO Assistant

You can now with the 3 parameters you've retrieved.

configure CISO Assistant