Skip to main content

Okta

Okta is an enterprise-grade, identity management service, built for the cloud, but compatible with many on-premises applications. With Okta, IT can manage any employee's access to any application or device.

For information about key features and requirements for BigPanda SSO integrations, see Single Sign-On.

SCIM support

The BigPanda Okta integration is compatible with the System for Cross-domain Identity Management (SCIM) standard. This allows admins to manage user and group information between BigPanda and the Okta Universal Directory. 

As users onboard, offboard, or change roles, you can provision or deprovision BigPanda accounts from within Okta, saving you time and effort.

If you are interested in enabling SCIM, contact your BigPanda account team.

Add Okta to BigPanda

  1. Go to the Settings > Single Sign-on.

  2. Select the Okta icon.

  3. Follow the on-screen instructions to add the BigPanda app to Okta.

Add BigPanda to Okta

  1. Log in to your Okta account and navigate to Admin section.

  2. From the Applications dropdown, select Applications.

  3. Click Add Application.

  4. Search or browse for BigPanda.

  5. Click Add.

  6. In the General Settings tab, enter the company name assigned to you by BigPanda. Click Next.

  7. From the users list, select the users you want to allow access to BigPanda.

  8. Click Done to finish installing the app.

You should now see Okta's instructions for configuring BigPanda. Copy the values shown in Step 3: Login URL/SignOn URL, IDP Issuer/Entity ID, and X.509 Certificate. These values are needed to complete the BigPanda setup

Add BigPanda to Okta for EU Customers

The process to add BigPanda to Okta is slightly different for customers within the EU:

  1. Log in to your Okta account and navigate to Admin section.

  2. From the Applications dropdown, select Applications.

  3. Click Create App integration.

  4. Select SAML 2.0 and click next.

  5. Fill out the General Settings (App Name is required) and click next.

  6. Configure the SAML Settings as follows:

    1. Single sign on URL: https://eu-api.bigpanda.io/login/{ORG-NAME}/okta/callback

    2. Audience URI (SP Entity ID): BigPanda ORG-NAME - as defined by the PS who created the org

    3. Default RelayState - leave empty

    4. Leave every other field as-is and click next

  7. Complete the OKTA feedback step as instructed

Configure Okta in BigPanda

  1. Return to BigPanda.

  2. Naivgate to Settings > Single Sign-On > Okta.

  3. In Step 3, Configure Okta Information in BigPanda, populate the following fields with the information from Okta:

    1. Issuer ID - Populate with the Login URL/SignOn URL

    2. SAML 2.0 Endpoint (HTTP) - Add the IDP Issuer/Entity ID

    3. X.509 Certificate - Paste the certificate without the BEGIN CERTIFICATE and END CERTIFICATE lines, and without whitespaces.

  4. In the final steps of the instructions, click Validate SSO Config

  5. A pop-up window will open where you can log in to your SSO provider. Enter your credentials.

  6. If your login is successful, you will be redirected to a new page. Select Activate SSO to enable SSO for your instance. If it fails, you can reconfigure and try again.

Invite Team Members

  1. Click Invite User from the settings menu to invite your team members to BigPanda. Use the user's email that is registered with your SSO system through Okta.

Users should now be able to log in to BigPanda with only their username at: https://a.bigpanda.io/#/login

Danger

If they are not currently logged into Okta, the user will be prompted to enter their login ID and Password.

If you have trouble, contact [email protected] for help.

Next Steps

Learn about User Management in BigPanda

Find Single Sign-On configuration steps

Learn how to control account access levels with Roles Management