Skip to main content

SSO account linking

You can integrate WhaTap Monitoring with Okta, a cloud-based solution for managing user accounts and access permissions. The Okta solution allows you to log on to numerous applications with a single account in high-level security environments. You can log on to the WhaTap services with the Okta account in your organization and use the services with the given roles.

Tip

What is Single Sign-On (SSO)?

Single Sign-On (SSO) is an authentication solution that allows users to log on to multiple applications and websites with a single user authentication. This SSO solution can meet both security and user experience requirements by allowing authorized users to access all password-protected resources without repeated logins.

Note

To enable the log on to WhaTap, a user must have an Okta account.

Okta integration

Follow the instructions below to configure the Okta integration with the WhaTap monitoring service.

Issuing an SSO key from WhaTap

  1. Log in the WhaTap monitoring service (https://service.whatap.io).

  2. Select the profile icon on the upper right of the screen.

  3. If a pop-up menu appears, select Manage Accounts.

  4. In the menu on the right of the screen, select SSO Integrations.

  5. Enter the key name in Issue SSO Key within the Service provider ID (WhaTap) section.

    The key name can be entered by the user.

    Service provider ID

  6. Select Issue SSO Key.

  7. In Check SSO information, check the values for EntityID and Sign-On URL and then copy them.

    sso-info

Note
  • Up to 5 SSO keys can be issued, and each has its own unique authentication data.

  • Select Issue additional SSO key, add the SSO key, and then proceed with the next procedure.

  • For the added SSO information, select and check the list box in Key Name.

Configuring the Okta authentication

  1. Access the Okta Admin page.

  2. Go to Applcations > Applications.

  3. Select Create App Integration.

  4. If the Create a new app integration pop-up window appears, click SAML 2.0 and then select Next.

  5. Enter the value for App name and then select Next.

  6. Enter the General items in the SAML Settings section sequentially.

    Okta - SAML Settings

    • Single sign-on URL: Enter the Sign-On URL among the SSO-related data issued from WhaTap.

    • Audience URI (SP Entity ID): Enter the value for EntityID from the SSO data issued from WhaTap.

    • In the Application username list, select Email.

  7. In Attribute Statements (optional), enter email in Name and then select user.email in Value.

    Okta - Attribute Statements

  8. Select Next.

  9. In the following screen, select This is an internal app that we have created and then select Finish.

Copying the Okta meta data

  1. Access the Okta Admin page.

  2. Go to Applcations > Applications.

  3. Select the Sign On tab.

  4. In Metadata URL, select Copy.

    Metadata URL

  5. To register the copied value, go to the WhaTap's SSO Integrations menu.

Registering the external Idp in WhaTap

  1. In the WhaTap monitoring service, go to SSO Integrations.

  2. In the Credentials section, select Register External IdP.

    External IdP

  3. If the Register External IdP window appears, paste the Metadata URL copied from Okta to Metadata.

  4. Select Register Metadata to automatically convert the authentication data.

  5. Select Save.

The SSO linking is now finished.

Assigning users

  1. Access the Okta Admin page.

  2. Go to Applcations > Applications.

  3. Select the application added from the list.

  4. Select the Assignments tab.

  5. Click Assign and then select Assign to People (or Assign to Groups).

    Assignments

  6. Assign desired users.

    Assignments

  7. Select Save and Go Back.

    Assignments

  8. Finish all the steps and then select Done.

    Assignments

Checking the SSO linking

  1. Access the Okta Admin page.

  2. Go to Applcations > Applications.

  3. Select the application added from the list.

  4. Select the General tab.

  5. Scroll down to App Embed Link.

    Okta - App Embed Link

  6. Copy the URL in Embed Link.

  7. Go to the copied URL in your web browser.

If you can log on to the WhaTap monitoring service, the connection is successful.

Note
  • If SSO has been linked for the first time, it is required to register the link information (automatic) through password authentication when the email account exists in WhaTap.

  • If you have no email address, registration of WhaTap membership and link information is automatically performed after entry of the required data.

Deleting the SSO key

  1. In the WhaTap monitoring service, go to SSO Integrations.

  2. In the Service provider ID (WhaTap) section, select the Key Name to delete from Check SSO information.

    Delete SSO Key

  3. Select Delete SSO Key.

  4. If the deletion confirmation window appears, select Delete SSO Key.

Modifying/deleting an external IdP

  1. In the WhaTap monitoring service, go to SSO Integrations.

  2. In the Credentials section, select Modify External IdP.

  3. If the Modify External IdP window appears, paste the Okta meta data to Meatadata.

  4. Select Register Metadata to automatically convert the authentication data.

  5. Select Save.

Tip

To delete the External IdP information, click Modify External IdP and then select Delete in the pop-up window.