CDNetworks ドキュメントセンター IAM User Guide Example of Using Okta for SAML SSO

Example of Using Okta for SAML SSO

最終更新日:2026-03-25 15:25:38

Okta SAML Integration Steps

Log in to OKTA to configure the application

  1. Log in to the Okta platform as an administrator. In the upper right corner, click “Your Org” or [Admin].
    Update to Chinese Display Name for Security Products
    Update to Chinese Display Name for Security Products

  2. Select “Applications” - “Applications” - “Create App Integration” to create an application.
    Update to Chinese Display Name for Security Products

  3. Select the application type “SAML2.0” and click “Next” to enter the configuration page.
    Update to Chinese Display Name for Security Products
    (1) Fill in the General Settings. Please configure as follows:
    App name: Application name;
    App logo (optional): Application logo identifier;
    App visibility: Select “Do not display application icon to users”
    Update to Chinese Display Name for Security Products
    (2) Click “Next” and complete the Configure SAML section as follows:
    Single sign-on URL:
    https://login.cdnetworks.com/cas/login?client_name=${provider}
    Reference for provider creation: SAML Configuration for SP during SSO
    (3) Select “Use this for Recipient URL and Destination URL”;
    (4) Audience URI (SP Entity ID) configuration: https://login.cdnetworks.com
    (5) application username: Okta username
    (6) Show Advanced Settings configuration:
    Update to Chinese Display Name for Security Products
    SAML Issuer ID: customizable. If left blank, a default value will be automatically generated.
    Update to Chinese Display Name for Security Products
    (7) Attribute Statements (optional)
    Update to Chinese Display Name for Security Products

Fill in the configuration:
Name:

https://login.cdnetworks.com/SAML/Attributes/LoginName

Value:

wsc:iam::${parentLoginName}:login-name/${loginName},wsc:iam::${parentLoginName}:saml-provider/${provider}

${parentLoginName}: Replace with your corresponding CDNetworks main account.
• ${loginName}: Replace with the CDNetworks account used by your current IdP user to access CDNetworks.
• ${provider}: Replace with the name of the SAML identity provider you created in the CDNetworks console.
Reference documentation: SSO SAML Response
(8) Click “Next”, select the appropriate option based on your actual business scenario, and then click “Finish”.
Update to Chinese Display Name for Security Products
Update to Chinese Display Name for Security Products
(9) Assignments (User Assignment)
Update to Chinese Display Name for Security Products
Update to Chinese Display Name for Security Products
Update to Chinese Display Name for Security Products
After completing the UserName configuration in step (10), return to the Basic Configuration page and re-enter the Saml Settings.
Update to Chinese Display Name for Security Products
Update to Chinese Display Name for Security Products
In (11) Attribute Statements (optional), add another configuration item:
Name:
https://login.cdnetworks.com/SAML/Attributes/RoleSessionName
Value:
${NameID} — The value here should be the User Name specified in step (9).
Update to Chinese Display Name for Security Products
(12) Preview SAML configuration
Update to Chinese Display Name for Security Products

Note: Please check if the value of NameId is consistent with the value in RoleSessionName.
Update to Chinese Display Name for Security Products
After confirming all details are correct, click “Next”, then click “Finish”. All Okta configurations are now complete.
Update to Chinese Display Name for Security Products
Update to Chinese Display Name for Security Products

Provider Information Configuration in CDNetworks console

  1. View Okta metadata documentation
    Update to Chinese Display Name for Security Products
    Update to Chinese Display Name for Security Products
    Update to Chinese Display Name for Security Products
  2. Upload the metadata file to the CDNetworks console
    Reference document: SAML Configuration for SP
    Update to Chinese Display Name for Security Products

Access Test

  1. CDNetworks redirects to Okta authentication
    Access the address https://login.cdnetworks.com/cas/clientredirect?client_name=${provider} directly in your browser to verify whether it redirects to the Okta login page.
  2. Okta redirects to CDNetworks for authentication
    After Okta authentication is successful, it will redirect to CDNetworks for Single Sign-On without requiring username and password input.

Frequently Asked Questions

1. Issue: Login authentication failed, displaying the following message
Update to Chinese Display Name for Security Products
Solution:
Preview SAML information
Update to Chinese Display Name for Security Products
Confirm whether the value of Issuer is consistent with the entityID in the metadata file uploaded to CDNetworks console.
Update to Chinese Display Name for Security Products
Update to Chinese Display Name for Security Products
If inconsistencies are found, repeat the steps in part two. Download the latest configuration and re-upload it.

For other common issues, please refer to the documentation: Common Questions on Identity Provider Configuration