your database front-end

Okta Single-Sign-on Setup

The following describes how to set up Single-Sign-on in dbFront using Okta (Okta.com).

Okta is one of the premier identity providers in the industry.

Information Collection

When setting up Okta Single-Sign-on you need to collect or decide on the following pieces of information:

  1. Determine a display name for your application. e.g. "dbFront - Records Maintenance",
  2. Determine the root URL for your dbFront install.  This would be something like:
    • https://dbFront.YourCompany.com/dbFront/ (public server with SSL)
    • http://YourServer/dbFront/ (internal server without SSL)
  3. Create a unique application id:  A suggested value is "sp.dbFront.YourCompany.com",
  4. Determine / Create an Okta group for administrators: e.g. "dbFrontAdmins"

Okta Application Setup Steps

Before proceeding, it would be good to review the Okta documentation for adding a SAML2 application.  See: Okta SAML 2

  1. Browse to the Okta login page: https://yourcompany.okta.com,
  2. Complete the login,
  3. Click on the Applications link on the top menu to view the configured applications,
  4. Click on the big green  Create New App  button to configure a new application,
  5. Choose the "Sign on method SAML 2.0" and click next,
  6. Wizard page 1 "General Settings":
    1. App Name: e.g. "dbFront - Records Maintenance",
    2. App logo: Adjust the Logo as desired.
  7. Click Next,
  8. Wizard page 2 "SAML Settings":
    1. Single sign on URL: This should match the root URL for your dbFront install, e.g. "https://dbFront.YourCompany.com/dbFront/default.aspx",
      Note: The "/default.aspx" must be included when using Okta,
    2. Audience URI (SP Entity ID): This value must match the dbFront Application Id configured in dbFront, the value suggested above was "sp.dbFront.YourCompany.com",
    3. Group Attribute: Add the group attribute "memberOf":
      1. The name must be "memberOf",
      2. The format should be "Basic",
      3. You must select a filter with a value or no groups will be returned,
        e.g.   Contains: admin
    4. Download and save the Okta Certificate.
  9. Click Next,
  10. Wizard page 3 "Feedback",
    1. Are you a customer or partner: Select "I'm an Okta customer adding an internal app".
    2. App type: Check "This is an internal app that we have created"
      Note: This is required because dbFront is a client installed application instead of a SAAS service.
  11. Click   Finish  to save the application settings,
  12. Once the application is created it will reopen with the "Sign On" tab visible,
  13. The "Sign On" tab will contain a notice with further instructions,
    OKTA More Info
  14. Click on the "View Setup Instructions" to retrieve the information needed for dbFront,
  15. A new window will open with the title "How to Configure SAML 2.0 for dbFront - Records Maintenance Application",
  16. Please save the following (Copy => Paste):
    1. Identity Provider Single Sign-On URL: Enter in dbFront as the Okta Endpoint Url (see below),
    2. X.509 Certificate: Enter in dbFront as the Okta Public Certificate (see below),

Okta Groups and Users

Please review the Okta documentation for instructions on creating and assigning users and groups to the dbFront application.

dbFront Application Setup Steps

After creating the application in Okta, you can then proceed with the setup in dbFront.

The Okta specific instructions are:

  1. Single-Sign-On Service: Okta,
  2. dbFront Application Id: sp.dbFront.YourCompany.com,
  3. Okta Endpoint Url: As collected from SAML config above,
  4. Okta Public Certificate: As collected from SAML config above,
  5. Okta Admin Group: Enter the name of the Okta admin group that should have admin access to dbFront,
  6. Logout Redirect Url: Enter "https://yourcompany.okta.com/app/UserHome"
    This special URL will allow users who log out of dbFront to return to the Okta menu where they can either log out completely or start another application.

dbFront - Field Preferences

For complete instructions on completing the dbFront Single-Sign-on setup see: Single-Sign-on

Trouble Shooting

For a list of Single-Sign-On issues and answers see: Single-Sign-On Questions

Content you want the user to see goes here.
close