Log in to your Okta account, create a domain when prompted. For example: sonicwallsk.okta.com
.
Click Add App under Use single sign on.
Click Create New App to create a new app.
In General Settings, enter “SMA100 VPN” (Just an example) in the App name box, and then click Next.
In Configure SAML, under SAML Settings, paste the URL: https://{appliance ‘s IP address or Hostname}/ api /v1/logon/saml2ssoconsumer
in Single sign on URL, Recipient URL, Destination URL and Audience Restriction (SP Entity ID) fields.
Email set to “user.email”
The Sign On section of created “SMA100 VPN” application appears. Keep this page open in a separate tab or browser window. You need to return to this page and copy the “Identity Provider metadata” link later. (To copy that link, right-click on the Identity Provider metadata link and select Copy).
Click View setup Instructions and download the certificate. (This information is required while configuring authentication server in SMA100 appliance).
In the new tab that opens, click Assign and select Assign to People.
Upload Okta SAML certificate in the SMA 100 appliance on system > certificates page.
Create a SAML domain with data of Okta IDP:
Authentication service URL is Identity Provider Single Sign-On URL value present in Okta.
You can now proceed with authentication from Virtual Office portal and NetExtender. When you select Okta domain in the login page, you are redirected to the Okta login page, and after providing correct credentials, the authentication is successful.