다큐멘트 센터 IAM User Guide Example of Using Okta for SAML SSO

Example of Using Okta for SAML SSO

최신 업데이트:2026-03-25 15:22:03

Okta SAML Integration Steps

Log in to OKTA to configure the application

  1. Log in to the Okta platform as an administrator. In the upper right corner, click “Your Org” or [Admin].
    image.png
    image.png

  2. Select “Applications” - “Applications” - “Create App Integration” to create an application.
    image.png

  3. Select the application type “SAML2.0” and click “Next” to enter the configuration page.
    image.png
    (1) Fill in the General Settings. Please configure as follows:
    App name: Application name;
    App logo (optional): Application logo identifier;
    App visibility: Select “Do not display application icon to users”
    image.png
    (2) Click “Next” and complete the Configure SAML section as follows:
    Single sign-on URL:
    https://login.cdnetworks.com/cas/login?client_name=${provider}
    Reference for provider creation: SAML Configuration for CDNetworks SP during SSO
    (3) Select “Use this for Recipient URL and Destination URL”;
    (4) Audience URI (SP Entity ID) configuration: https://login.cdnetworks.com
    (5) application username: Okta username
    (6) Show Advanced Settings configuration:
    image.png
    SAML Issuer ID: customizable. If left blank, a default value will be automatically generated.
    image.png
    Reference documentation: SSO SAML Response
    (7) Click “Next”, select the appropriate option based on your actual business scenario, and then click “Finish”.
    image.png
    image.png
    (8) Assignments (User Assignment)
    image.png
    image.png
    image.png

Provider Information Configuration in CDNetworks Console

  1. View Okta metadata documentation
    image.png
    image.png
    image.png
  2. Upload the metadata file to the CDNetworks Console
    Reference document: SAML Configuration for SP
    image.png

Access Test

  1. CDNetworks redirects to Okta authentication
    Access the address https://login.cdnetworks.com/cas/clientredirect?client_name=${provider} directly in your browser to verify whether it redirects to the Okta login page.
  2. Okta redirects to CDNetworks for authentication
    After Okta authentication is successful, it will redirect to CDNetworks for Single Sign-On without requiring username and password input.

Frequently Asked Questions

1. Issue: Login authentication failed, displaying the following message
image.png
Solution:
Preview SAML information
image.png
Confirm whether the value of Issuer is consistent with the entityID in the metadata file uploaded to CDNetworks Console.
image.png
image.png
If inconsistencies are found, repeat the steps in part two. Download the latest configuration and re-upload it.

For other common issues, please refer to the documentation: FAQs about IDP Configuration

이 문서의 내용이 도움이 되었습니까?
아니오
정상적으로 제출되었습니다.피드백을 주셔서 감사합니다.앞으로도 개선을 위해 노력하겠습니다.