We are in process of setting up our new SaaS portal to work with OKTA for IAM. We were told we needed to contact support who would have to help setup/allow this configuration.
Please let us know what other information you will require.
Release : 5.2
This feature will need to be enabled
Steps:
login as admin to Portal
click on "Portal API" menu item
choose the "Portal API (tenantid)" and "Portal API App for tenantid"
on the right side, look for the "Settings" API
execute GET /Settings call using "FEATURE_FLAG_OKTA_IDP" as input
you will get a response similar to the below:
{
"CreateTs": "1686200346750",
"TenantId": "tenantid",
"Uuid": "bae56df4-0ed5-483e-87ab-b15464cda349",
"ModifyTs": "1686200346750",
"CreatedBy": "system",
"Value": "true",
"__metadata": {
"uri": "http://<tenantid.SAAS,address>:8080/portal-data/Portal.svc/Settings('FEATURE_FLAG_OKTA_IDP')"
},
"ModifiedBy": null,
"Name": "FEATURE_FLAG_OKTA_IDP"
}
Now copy this value to text editor and change the value of "Value" to "false" from "true"
Now use that json to make a PUT /Settings call
{
"CreateTs": "1686200346750",
"TenantId": "tenantid",
"Uuid": "bae56df4-0ed5-483e-87ab-b15464cda349",
"ModifyTs": "1686200346750",
"CreatedBy": "system",
"Value": "false",
"__metadata": {
"uri": "http://<tenantid.SAAS-address>:8080/portal-data/Portal.svc/Settings('FEATURE_FLAG_OKTA_IDP')"
},
"ModifiedBy": null,
"Name": "FEATURE_FLAG_OKTA_IDP"
}
This will disable the feature flag.
Now you delete the auth scheme that you created earlier and create a new saml auth scheme/TEST
This is for SaaS portal ONLY