다큐멘트 센터 IAM User Guide Example of Using Okta for SAML SSO

Example of Using Okta for SAML SSO

최신 업데이트:2026-03-25 15:25:38

Okta SAML Integration Steps

Log in to OKTA to configure the application

  1. Log in to the Okta platform as an administrator. In the upper right corner, click “Your Org” or [Admin].
    云安全产品维护公告
    云安全产品维护公告

  2. Select “Applications” - “Applications” - “Create App Integration” to create an application.
    云安全产品维护公告

  3. Select the application type “SAML2.0” and click “Next” to enter the configuration page.
    云安全产品维护公告
    (1) Fill in the General Settings. Please configure as follows:
    App name: Application name;
    App logo (optional): Application logo identifier;
    App visibility: Select “Do not display application icon to users”
    云安全产品维护公告
    (2) Click “Next” and complete the Configure SAML section as follows:
    Single sign-on URL:
    https://login.cdnetworks.com/cas/login?client_name=${provider}
    Reference for provider creation: SAML Configuration for SP during SSO
    (3) Select “Use this for Recipient URL and Destination URL”;
    (4) Audience URI (SP Entity ID) configuration: https://login.cdnetworks.com
    (5) application username: Okta username
    (6) Show Advanced Settings configuration:
    云安全产品维护公告
    SAML Issuer ID: customizable. If left blank, a default value will be automatically generated.
    云安全产品维护公告
    (7) Attribute Statements (optional)
    云安全产品维护公告

Fill in the configuration:
Name:

https://login.cdnetworks.com/SAML/Attributes/LoginName

Value:

wsc:iam::${parentLoginName}:login-name/${loginName},wsc:iam::${parentLoginName}:saml-provider/${provider}

${parentLoginName}: Replace with your corresponding CDNetworks main account.
• ${loginName}: Replace with the CDNetworks account used by your current IdP user to access CDNetworks.
• ${provider}: Replace with the name of the SAML identity provider you created in the CDNetworks console.
Reference documentation: SSO SAML Response
(8) Click “Next”, select the appropriate option based on your actual business scenario, and then click “Finish”.
云安全产品维护公告
云安全产品维护公告
(9) Assignments (User Assignment)
云安全产品维护公告
云安全产品维护公告
云安全产品维护公告
After completing the UserName configuration in step (10), return to the Basic Configuration page and re-enter the Saml Settings.
云安全产品维护公告
云安全产品维护公告
In (11) Attribute Statements (optional), add another configuration item:
Name:
https://login.cdnetworks.com/SAML/Attributes/RoleSessionName
Value:
${NameID} — The value here should be the User Name specified in step (9).
云安全产品维护公告
(12) Preview SAML configuration
云安全产品维护公告

Note: Please check if the value of NameId is consistent with the value in RoleSessionName.
云安全产品维护公告
After confirming all details are correct, click “Next”, then click “Finish”. All Okta configurations are now complete.
云安全产品维护公告
云安全产品维护公告

Provider Information Configuration in CDNetworks console

  1. View Okta metadata documentation
    云安全产品维护公告
    云安全产品维护公告
    云安全产品维护公告
  2. Upload the metadata file to the CDNetworks console
    Reference document: SAML Configuration for SP
    云安全产品维护公告

Access Test

  1. CDNetworks redirects to Okta authentication
    Access the address https://login.cdnetworks.com/cas/clientredirect?client_name=${provider} directly in your browser to verify whether it redirects to the Okta login page.
  2. Okta redirects to CDNetworks for authentication
    After Okta authentication is successful, it will redirect to CDNetworks for Single Sign-On without requiring username and password input.

Frequently Asked Questions

1. Issue: Login authentication failed, displaying the following message
云安全产品维护公告
Solution:
Preview SAML information
云安全产品维护公告
Confirm whether the value of Issuer is consistent with the entityID in the metadata file uploaded to CDNetworks console.
云安全产品维护公告
云安全产品维护公告
If inconsistencies are found, repeat the steps in part two. Download the latest configuration and re-upload it.

For other common issues, please refer to the documentation: Common Questions on Identity Provider Configuration

이 문서의 내용이 도움이 되었습니까?
아니오
정상적으로 제출되었습니다.피드백을 주셔서 감사합니다.앞으로도 개선을 위해 노력하겠습니다.