Overview
This tutorial explains how to configure Incydr to use single sign-on (SSO) with Okta.
For instructions about how to use Okta with Incydr's provisioning provider feature, see How to provision users to Incydr from Okta.
This article assumes you are already familiar with SSO and the SAML standard. For more information about how Incydr implements SSO, see our Introduction to single sign-on.
Single sign-on (SSO) for Incydr
• These SSO instructions apply only if you access Incydr directly via a console.*.code42.com URL (typically for SSO configured before September 2025).
• If you access Incydr from the Mimecast Administration Console after signing in at login.mimecast.com, these instructions do not apply to you (typically for SSO configured after September 2025).
• Directory services information, however, applies to all Incydr environments.
Considerations
Our Technical Support Engineers can help with authentication issues caused by interaction with Incydr products. However, troubleshooting authentication issues outside your environment is beyond the scope of our Technical Support Engineers. For assistance with external authentication systems, contact your authentication vendor.
- To use this functionality, you must be assigned the Identity Management Administrator role.
- Incydr usernames must match SSO usernames. How you accomplish this depends on how you deploy agents.
- Incydr supports service provider-initiated SSO but does not support identity provider-initiated SSO. Therefore, users cannot sign in to your environment from the identity provider's website or application, but instead must log in using a browser bookmark.
- SSO provides user authentication but does not provide user management. Set up SCIM provisioning or use the Incydr console to manage users.
- Incydr does not support Single Logout (SLO). Users must sign out of the identity provider to end their single sign-on session.
- The Incydr console expects SAML assertions to be signed. To configure Incydr to support advanced SAML request configurations, see Set SAML attributes for SSO.
- Okta uses SHA-256 for the SAML signature algorithm, and Incydr also uses SHA-256 by default. If you need to change Incydr to use another algorithm, employ the Incydr API to set the requestAuthnSignatureMethod and requestAuthnDigestMethod attributes. For directions, see Set SAML attributes for SSO.
Before you begin
Verify network connectivity
Configure your private network, Internet, and VPN settings to allow client devices to communicate with your identity provider on ports 80 and 443. Test client connectivity to the identity provider before you proceed.
Step 1: Determine the metadata URL for your environment
When you configure Okta to connect to Incydr, you must provide the Incydr metadata URL. Do the following to obtain the URL:
- Sign in to the Incydr console.
- Navigate to Administration > Integrations > Identity Management.
- Locate the service provider metadata URL:
- When setting up an authentication provider for the first time, the URL appears on the main screen:
- If you previously set up an authentication provider, the URL appears in the authentication provider details:
- When setting up an authentication provider for the first time, the URL appears on the main screen:
- Record the metadata URL for use later. The first portion of the URL is your Incydr cloud URL, for example, https://example.com in the image above.
- Copy the service provider metadata URL and paste it in the address bar of a new browser window.
Your environment's metadata details appear. - Find the AssertionConsumerService and its Location URL value, for example, Location="https://example.com/api/SsoAuthLoginResponse". The first portion of the URL is your Incydr cloud URL, for example, https://example.com. Record this URL for use later. You will enter this URL to the Server URL field in Okta in Step 3.
Step 2: Add the Okta application
Step 3: Configure Okta's sign on tab
- In the Okta Dashboard, go to Applications and select the Code42 app.
- On the Sign On tab, click Edit.
- Copy the Identity Provider metadata link. You will need it in the next step.
- Next to Server URL, enter the metadata URL you recorded from Step 1. Typically, it is the same URL you use to access the Incydr console, such as https://console.us.code42.com.
- Click Save.
Step 4: Add Okta as an authentication provider
- Sign in to the Incydr console.
- Navigate to Administration > Integrations > Identity Management.
- Click Add Authentication Provider.
- In Display name, enter an identity provider name to display to users that sign in with SSO.
If your environment provides more than one SSO identity provider, users see a list of providers to choose from. They must select the provider configured for their Incydr organization. - In Provider's Metadata, ensure that Enter URL is selected and paste the URL for the identity provider metadata XML file.
- Click Create Provider.
Authentication provider settings appear.
Note the following message on the dialog:
This provider will not be applied to an organization until you update the organization security settings.
Do not apply this authentication provider to organizations yet. You will apply this provider to a test organization and to production organizations in later steps.
- If you choose not to use the default mapping settings, you can use Attribute Mapping to customize mappings between Incydr user attributes and authentication provider SSO assertion attributes.
- Click the Edit icon.
- Deselect Use default mapping.
- Configure mapping settings for each Incydr user attribute.
Each field supports up to 128 characters. - Click Save.
- Click the Edit icon.
- (Optional) Local Users displays the current user. If there are any other users you want to exempt from using this authentication provider to log in, enter them here.
Step 5: Test SSO authentication
Step 6: Apply this provider to production organizations
Step 7: Add new users who sign in with SSO
- Assign the Coded42 app to users or groups in the Okta dashboard. See Okta's documentation for more information.
- Ensure users are set up in Incydr. You can add users manually with the Incydr console to an organization that uses SSO, or deploy agents to users in an organization that uses SSO. The users in Incydr must have first name, last name, and user name (email address) values that match the users' values in Okta.
You can also add new users to your environment using Okta's provisioning. See How to provision users to Incydr from Okta.
What to expect
Reduced authentication prompts
Lost access to an identity provider
External resources
- Wikipedia:
- Okta: Documentation
Comments
Please sign in to leave a comment.