MCS from version 1.3.0
Table of Contents
Table of Contents | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
|
...
Navigate to Applications → Applications in the left sidebar.
Click the Create App Integration button.
Select SAML 2.0 and click Next.
Provide an App Name and click Next.
Configure the SAML settings in the Configure SAML window tab:
Single Sign-On URL: Enter the MCS Login URL Route prefixed with
https://{MCS IP}/
.
Example:Code Block https://{MCS IP}/api/5.0/auth/saml/login/callback
Audience URI (SP Entity ID): Enter a unique ID. (This must match the Entity ID in MCS).
Name ID Format: Select Persistent.
Fill in the Feedback window tab:
In the App Type field, enable This is an internal app that we have created.
Click Finish.
...
Navigate to Directory → Groups in the left sidebar.
Click Add Group.
Provide a Name and an optional Description for the group.
Refresh the page to view the new group.
Repeat for additional groups if needed.
...
Navigate to Applications → Applications.
Find the SAML Configuration Application you previously created in Okta.
Click the name of your SAML Configuration Application.
Navigate to the General tab in the SAML Configuration Application.
Scroll to the SAML Settings section and click Edit.
In the Edit SAML Integration window, in the General Settings tab:
Click on the Next button to get to the Configure SAML tab.
Scroll down in the SAML Settings to the Group Attribute Statements (optional).
Enter group in the Name field. (This must be spelled exactly as "group").
Leave Name Format as Unspecified.
Choose a filter (e.g., Equals or Starts With) and provide the appropriate value based on your group's name.
...
Navigate to Applications → Applications.
Find the SAML Configuration Application you previously created in Okta.
Click the name of your SAML Configuration Application.
Go to the Sign On tab at the top of the page.
Click the View SAML Setup Instructions button on the right side of the page, located under SAML Setup.
Copy the Identity Provider Single Sign-On URL field for later use.
Copy the X.509 Certificate field for later use. (Use the value between BEGIN CERTIFICATE and END CERTIFICATE).
Click on the menu icon.
A window displaying display of all the available widgets will open.
Navigate to Management → Identity Providers.
Fill in the required fields:
Entity ID / Issuer: Use the Audience URI (SP Entity ID) field you configured when setting up the SAML Configuration Application in Okta.
Entrypoint / IDP URL: Paste the Identity Provider Single Sign-On URL field you copied in step 7.
Certificate: Paste the X.509 Certificate field you copied in step 8.
Click Save to complete the configuration.
Expand | ||
---|---|---|
| ||
|
You and your users can now log in to MCS using Okta via SAML, in addition to the basic login method.