Lineaje Learning Center
  • About Lineaje
  • Lineaje Product Offering
  • Getting started
    • Create an account
      • Configure Azure AD for sso
      • Configure Okta for sso
    • Onboarding workflow
  • SBOM360, OSM
    • Generate an SBOM
      • Source Code Management (SCM) As Source
        • Public Code Repositories
        • Private Code Repositories
          • Configure GitHub credentials
          • Configure Bitbucket credentials
          • Configure Gitlab credentials
          • Configure Git credentials
          • Configure Azure Repo
        • Frequently Asked Questions
      • Container Image As Source
        • Public Container Image
        • Private Container Image
          • Configure AWS Elastic Container Registry
          • Configure Google Container Registry
          • Configure Docker Hub
          • Configure Generic OCI Registry
          • Configure Azure Container Registry
        • Frequently Asked Questions
      • Existing SBOM As Source
        • EO 14028 checks
      • Manifest file As Source
      • Android Package Kit (APK)
      • Using Lineaje CLI
    • Explore Your SBOM
      • Info
      • Attestation
      • IRL
      • Dependencies
      • Provenance
      • Vulnerabilities
      • Mitigations
      • Security Posture
      • Code Quality
      • Suppliers & Licenses
      • Findings
    • Manage Your SBOM
    • Dashboard
    • Search
    • Policies and Gates
    • Organization and User Management
      • Organization example
    • Lineaje AI
    • AI Plan and AI Remediate
      • JIRA Integration
  • SBOM360 Hub
    • My Products
    • My SBOMS
    • Find & Review SBOMs
    • Manage Your Repository
    • Request and Share SBOMS
    • Settings
    • User Roles
  • Lineaje CLI
    • System Configuration
    • Toolset Configuration
    • CLI Installation
    • CLI Usage
    • Troubleshooting CLI issues
    • Support matrix
  • Integration with CICD pipeline
    • Pre-Requisites
    • Generate Project from source code
      • Project creation using Lineaje cloud
  • Abbreviations and Descriptions
  • Release Notes
    • Unified Scanner for AWS
Powered by GitBook
On this page
  • Enable sso in Lineaje application
  • Create an application in Okta
  • Configure SAML in Okta
  • Assign users or groups
  • Follow SAML setup instructions in Okta
  • Configure the Lineaje application
  1. Getting started
  2. Create an account

Configure Okta for sso

PreviousConfigure Azure AD for ssoNextOnboarding workflow

Last updated 8 months ago

Enable sso in Lineaje application

Keep the EntityID and Callback URL handy

Create an application in Okta

  • Go to Okta portal and switch to admin mode.

  • From the left-hand side navigation pane, go to Applications -> Applications

  • Click on "Create APP Integration"

  • Select SAML 2.0 and click next.

  • Enter the app name, say "Demo-Okta-Sample"

Configure SAML in Okta

  • Fill the following values into their respective SAML configurations.

    • Audience URI (Entity ID) -> Entity ID which you have generated in Lineaje application

    • Single sign-on URL -> Post callback URL which you have generated in Lineaje application.

    • Select the Name ID Format as "EmailAddress"

  • Set the Attribute Statements. These attributes will be part of SAML assertion and this is required for Lineaje auth to function.

  • Click on following options and click on Finish. Depending on the version of Okta, there could be slightly different screens shown. Two variations are shown below.

Assign users or groups

  • Goto Assignments tab

  • Assign individual users or groups to the application.

Follow SAML setup instructions in Okta

  • Go to Sign On-> View SAML setup instructions link

  • Copy the identity provider single sign-on url, download the x.509 certificate

Configure the Lineaje application

  • Go back to Lineaje application

  • Copy the identity provider single sign-on url in "Sign-in URL"

  • Upload the certificate from previous step.

  • Proceed with activating Single Sign On(SSO)