OKTA - Single Sign-on (SSO)

This guide outlines the technical requirements for integrating OKTA as an Identity Provider (IdP) for Xima Software applications. This integration enables secure, centralized user management and Single Sign-On (SSO) capabilities

Prerequisites

Before beginning the integration, please ensure the following requirements are met:

  • Administrative Access: The customer must have administrative privileges within their own OKTA tenant.
  • Customer-Managed Solution: The customer is responsible for the internal configuration and maintenance of their OKTA environment. Xima Software personnel cannot access or manage the customer's OKTA instance.
  • Protocol Selection: The organization must determine which authentication protocol (SAML 2.0 or OIDC) aligns with their internal security policies.

Authentication Options

Administrators may choose between two primary authentication protocols: SAML 2.0 or OIDC/OAuth.

Option 1: SAML 2.0 (Enterprise Standard)

SAML 2.0 is the recommended protocol for strict corporate environments and systems requiring XML-based assertions.

Item NameProvided ByDescription
ACS URLXima SoftwareThe Assertion Consumer Service URL; the endpoint where Xima receives the XML POST from OKTA.
SP Entity IDXima SoftwareThe unique identifier for the application (often the base URL or ACS URL).
NameID FormatXima SoftwareThe expected username format (standardized as EmailAddress).
IdP SSO URLCustomerThe specific OKTA URL where the application redirects users for login.
IdP Issuer IDCustomerThe unique entity ID for the organization's OKTA instance.
X.509 CertificateCustomerThe public key certificate used to verify that the XML response is authentic.

Pro Tip: Configuration efficiency can be improved by generating a Metadata XML file from the Xima application and importing it directly into OKTA to auto-populate these fields.


Option 2: OIDC / OAuth (Modern Standard)

OpenID Connect (OIDC) is the modern standard, ideal for web-based applications and mobile platforms.

Item NameProvided ByDescription
Redirect URIXima SoftwareThe exact URL where OKTA sends the user after a successful authentication.
Logout Redirect URIXima Software(Optional) The destination for the user after logging out.
Client IDCustomerThe public identifier for the application within the OKTA system.
Client SecretCustomerA private security key. This must be treated as a sensitive credential.
Issuer URLCustomerThe base URL for the OIDC authorization server (e.g., https://company.okta.com).

Pro Tip: Once the Issuer URL is established, additional configuration details (endpoints, scopes, and keys) can be located by appending /.well-known/openid-configuration to the URL.



Integration Workflow

The following steps must be completed in order to establish a secure connection between Xima Software and OKTA.


SAML 2.0 Integration Sequence

  1. Provisioning (Xima): Xima Software provides the Service Provider (SP) Metadata (ACS URL and Entity ID) to the Customer.
  2. App Creation (Customer): The Customer creates a new SAML 2.0 App Integration within their OKTA Admin Console using Xima’s metadata.
  3. Handshake (Customer): The Customer exports the Identity Provider (IdP) Metadata (or the SSO URL, Issuer ID, and X.509 Certificate) and sends it to Xima Software.
  4. Finalization (Xima): Xima Software uploads the Customer’s IdP metadata into the application backend to complete the link.
  5. Validation (Joint): Both parties verify a successful login via a test user account.

OIDC / OAuth Integration Sequence

  1. Provisioning (Xima): Xima Software provides the Login Redirect URI to the Customer.
  2. App Creation (Customer): The Customer creates an OIDC - Web Application integration in their OKTA Admin Console.
  3. Handshake (Customer): The Customer copies the Client ID, Client Secret, and Issuer URL and securely provides them to Xima Software.
  4. Finalization (Xima): Xima Software configures the OIDC client settings in the application environment using the Customer’s credentials.
  5. Validation (Joint): Both parties verify that the application correctly redirects to OKTA and returns a valid token.