Enabling SAML using Okta

Important: As a best practice, these steps instruct you to require encryption on assertion, upload the StreamSets certificate to Okta, and configure the Okta app integration to encrypt the SAML assertion. If you do not want to configure SAML encryption, disable encryption on assertion and then skip the steps to upload the certificate and configure Okta to encrypt the assertion. For more information, see Service Provider Certificates.

Step 1. Retrieve IdP Information

In StreamSets Control Hub, choose Okta as your identity provider and then retrieve the IdP information generated by StreamSets for your organization.

  1. As a user with the Organization Administrator role, log in to StreamSets using local or public identity provider authentication.
  2. In the Control Hub Navigation panel, click Manage > My Organization.
  3. Click Configure SAML.
  4. Click the Draft tab.
  5. Choose Okta as your SAML identity provider.
  6. In the IdP SAML Configuration section on the right, verify that the Require Encryption on Assertion property is enabled and then copy the following values and save them in a temporary location:
    • Single Sign On URL
    • StreamSets Entity URI

  7. To configure StreamSets to sign SAML requests and to configure Okta to encrypt SAML response assertions, download the StreamSets SAML certificate by clicking the Download icon () in the List of SAML Certificates section on the right.

    The certificate is saved to your default downloads directory. For more information, see Service Provider Certificates.

  8. Click Save to save the changes made to the draft SAML configuration.

Step 2. Create an Okta App Integration

To register StreamSets as a service provider in Okta, use the IdP information that you retrieved from Control Hub to create a SAML app integration in Okta. Then, assign the app integration to all Okta users that need to log in to StreamSets.

Note: These steps provide brief instructions to create a SAML app integration using the Okta Admin Console. For detailed steps, see the Okta documentation.
  1. In the Okta Admin Console, click Applications > Applications.
  2. Click Create App Integration.
  3. In the Create a new app integration dialog box, select SAML 2.0, and then click Next.
  4. In the General Settings step, enter an app name.

    For example, you might enter StreamSets.

  5. Optionally, add a logo for the app integration that displays on the Okta dashboard.

    For example, you might add the StreamSets logo, as follows:

  6. Click Next.
  7. In the Configure SAML step, configure the following properties:
    Property Description
    Single sign on URL Paste the Single Sign On URL value that you copied from Control Hub.

    For example:

    https://<location>.streamsets.com/api/security/saml2/acs/<unique ID>

    Audience URI (SP Entity ID) Paste the StreamSets Entity URI value that you copied from Control Hub.

    For example:

    https://<location>.streamsets.com/api/security/saml2/entityId/<unique ID>

  8. Configure the Okta app integration to encrypt the SAML assertion.
    1. Click Show Advanced Settings.
    2. Set the Assertion Encryption property to Encrypted.
    3. Click Browse Files for the Encryption Certificate property, and select the SAML certificate that you downloaded from Control Hub.

      For more information, see Service Provider Certificates.

  9. Optionally, configure attribute statements so that Okta passes each user's first name and last name to StreamSets.

    Okta always passes each user's email address to StreamSets. For more information, see IdP Attribute Mappings.

    In the Attribute Statements section, add the following statements:
    Name Name Format Value
    firstName Basic user.firstName
    lastName Basic user.lastName
  10. Click Next.
  11. Enter your feedback on the Feedback tab, and then click Finish.

    The StreamSets app integration displays.

  12. In the Sign On tab, right-click the Identity Provider metadata link and save the IdP metadata to a file.

  13. Click the Assignments tab, and then assign the StreamSets app integration to all Okta users that need to log in to StreamSets.

    For detailed steps about assigning applications to users, see the Okta documentation.

    For example, the following image shows a StreamSets app integration that has been assigned to two users:

Step 3. Set up a Draft SAML Configuration

In StreamSets Control Hub, set up the draft SAML configuration for your organization by uploading the IdP metadata XML file downloaded from Okta, and then optionally configuring advanced properties. You can also enable or disable SP-initiated logins.

  1. In the Control Hub Navigation panel, click Manage > My Organization.
  2. Click Configure SAML.
  3. Click the Draft tab.
  4. In the Organization SAML Settings section, click Upload Metadata File from IdP and upload the metadata file that you downloaded from Okta.

    By default, the IdP Login Page property is automatically populated from the uploaded metadata, and SP-initiated logins from StreamSets are enabled, as follows:

  5. To disable SP-initiated logins and require IdP-initiated logins, disable the SP Initiated Login property.

    For more information, see IdP and SP-initiated Logins.

  6. If you created custom attribute statements in Okta that do not match the default values displayed for the IdP user properties, modify the property values as needed.

    In most cases, you can use the default values. For more information, see IdP Attribute Mappings.

  7. Optionally, click Show Advanced and modify the advanced properties.

    Control Hub automatically populates the advanced property values from the uploaded metadata file. In most cases, you do not need to modify the advanced properties.

  8. Click Save.
  9. If you enabled SP-initiated logins, click Test to test the configuration.

    The SAML debug console displays, indicating whether StreamSets is able to successfully send a request to Okta and receive a response. In case of a failure, use the listed errors to help you troubleshoot issues.

Step 4. Publish and Enable the SAML Configuration

After testing and validating that the draft SAML configuration is set up correctly with Okta, publish the configuration to production and then enable the configuration to activate it.

  1. In the Draft tab, click Publish at the bottom of the Organization SAML Settings section.
  2. Click Confirm.

    The Production tab displays a read-only version of the SAML configuration.

  3. At the bottom of the Production tab, click Enable to enable SAML authentication for your organization.
  4. Click Confirm.

    When enabled, all organization users must log in using SAML authentication. For more information, see IdP and SP-initiated Logins.

    To invite new users to the organization, first use Okta to assign the users to the StreamSets app integration. Then in Control Hub, use the email addresses from Okta to invite the users. For more information, see Adding Users.

    If existing organization users are assigned to the StreamSets app integration in Okta and originally joined with their email address from Okta, they simply use SAML authentication for the next login session. If existing organization users joined with a different email address, you must add them to the Control Hub organization again using the email address from Okta.