Polarity v4 Admin Guide
Polarity v5 Admin Guide
  • Sever Requirements
    • Deployment Methods
      • Deploying Polarity Server on AWS with RDS and Elasticache
      • Deploying Polarity Server Virtual Machine on Azure
      • Deploying via OVA
      • Deploying via RPM
      • Polarity Server BYOL AMI
  • Guides
    • Installing License
    • Authentication
      • SAML
        • Azure ADFS
        • Okta
        • SAML Troublshooting
      • LDAP Troubleshooting
    • Installing Private Certificate Authority
    • Installing SSL Certificate
      • Installing LetsEncrypt SSL Certificate on Polarity Server
    • Configuring a Proxy
    • Migrating Polarity Servers
      • Upgrade PostgreSQL to v13
    • Enabling SMTP
    • Server Environment Variables
    • File System Layout
    • Configuring a FQDN
    • Enabling Source Analytics
      • Elasticsearch
        • Configuring Source Analytics on Elasticsearch
        • Source Analytics Integration with Elasticsearch
    • v5 Server Pre-Flight Upgrade Check
  • Integrations
    • Auto Subscribe CLI Tool
    • Installation
    • Install Multiple Copies of an Integration
    • Modifying Integration Name & Acronym
    • Add Custom Entity Types
Powered by GitBook
On this page
  • Create Polarity Application in Okta
  • General Settings
  • Configure SAML
  • Configure SAML in Polarity
  • Polarity SAML Options
  • Save Options
  1. Guides
  2. Authentication
  3. SAML

Okta

Configure SAML authentication with Okta

PreviousAzure ADFSNextSAML Troublshooting

Last updated 2 years ago

Polarity SAML authentication should work with any identity provider (IdP) given the application is set up correctly within the identity provider's account. This guide walks through configuring Polarity SAML Authentication with Okta SAML 2.0.

Create Polarity Application in Okta

The first step to setting up SAML authentication is to create a new Polarity Application within Okta. To do this, navigate to "Applications" and click on "Create App Integration"

Select the "SAML 2.0" option and click "Next". Fill in the settings as follows:

General Settings

App name

Polarity

App logo (optional)

You can download and upload the Polarity logo from this link:

Click "Next" to go the next page of options

Configure SAML

Single sign-on URL

https://<yourpolaritydomain>/v2/saml/assertion

Audience URI (SP Entity ID)

https://<yourpolaritydomain>

Default RelayState

leave blank

Name ID format

EmailAddress

Application Username

Email

Update application username on

Create and update

Attribute Statements

Name
Name format
Value

username

Unspecified

user.login

email

Unspecified

user.email

fullname

Unspecified

user.firstName

Group Attribute Statements

leave blank

Click "Next" and finish the Application setup

Navigate to the "Polarity" application in Okta and click on the "Sign On" tab at the top of the page.

On the right hand side find the button that says "View SAML setup instructions"

This page provides all the settings required when configuring SAML via the Polarity Sever Configuration page.

Configure SAML in Polarity

Now that the Polarity Okta Application has been setup we can configure SAML within Polarity using the SAML configuration values provided by Okta in the step above. To get to the SAML configuration page within Polarity navigate to "Advanced Settings" -> "Server Configuration" -> "Client Authentication" and then pick "SAML" from the drop down menu:

Fill in the SAML options on the right as follows.

Polarity SAML Options

SAML Endpoint URL

From the Okta configuration page, copy the "Identity Provider Single Sign-On URL" value

and paste it into the Polarity SAML configuration page as the "SAML Endpoint URL" option value:

SAML certificate

From the Okta configuration page, copy the "X.509 Certificate" option value and paste it into the "SAML Certificate" option value within Polarity.

Sign in button label

You can modify the SAML sign in button label here with your preferred text. The default value is "Sign in with SAML".

Username attribute

username

Email attribute

email

Full name attribute

fullname

Group attribute (optional)

This is the the attribute in the SAML assertion which specifies which groups the user belongs to (optional). If this field is left empty then no authorization checks will be made and all authenticated SAML users will be able to access Polarity. If an invalid attribute is provided no users will be authorized.

If this attribute is provided and you would like Polarity to enforce authorization you should also fill out the Authorized groups regular expression option.

If you are controlling access to Polarity via Okta Assignments leave this option blank and assign users to the Polarity Application via Okta.

Authorized group regular expression (optional)

If provided, each group the user belongs to as specified by the Group attribute option will be matched against the provided regular expression. If any group matches, the user will be authorized to login to Polarity. The provided regular expression should not include leading or trailing forward slashes. In addition, the regular expression will be wrapped in ^(?: )$ to default to exact matches.

Save Options

In the top right of the Polarity web interface, click on the "Apply Changes" button to save your new SAML configuration.

The Polarity sign in page will now have an additional "Sign in with SAML" button (possibly renamed if you modified the Sign in button label option). When a user clicks on this button they will be redirected to Okta to authenticate. If the user has been assigned access to the Polarity application in Okta, a new local account will automatically be created for that user and they will be logged into Polarity.

Users that sign in via SAML cannot login with the local account as the account will be marked as "remote" within Polarity. All password management for the account is done via Okta.

https://assets.polarity.io/img/logos/logo-large.png
Identity Provider Single Sign-On URL in Okta
SAML endpoint URL in Polarity