orchestrator
2021.10
false
- Getting started
- Best practices
- Tenant
- Folders Context
- Automations
- Processes
- Jobs
- Triggers
- Logs
- Monitoring
- Queues
- Assets
- Storage Buckets
- Test Suite - Orchestrator
- Other Configurations
- Integrations
- Classic Robots
- Host administration
- About the host level
- Managing system administrators
- Managing tenants
- Configuring system email notifications
- Audit logs for the host portal
- Maintenance Mode
- Organization administration
- Troubleshooting

OUT OF SUPPORT
Orchestrator User Guide
Last updated Oct 31, 2024
Okta Authentication
linkConfigure Okta to Recognize a New Orchestrator Instance
linkNote: The below steps are valid for Okta SAML setup. Please note that the below procedure is a broad description of a sample configuration. For a fully detailed how-to, visit the official Okta documentation.
- Log in to Okta. The following setup is made in Classic UI view. You can change it from the drop-down on the top-right corner of the window.
- On the Application tab, click Create New App. The Create a New Application Integration window is displayed.
- Choose SAML 2.0 as sign-on method and click Create.
- For the new integration, on the General Settings window, enter the application name.
- On the SAML Settings window, fill in the General section as per this example:
- Single sign on URL: The Orchestrator instance URL +
/identity/Saml2/Acs
. For example,https://orchestratorURL/identity/Saml2/Acs
. - Enable the Use this for Recipient URL and Destination URL check box.
- Audience URI:
https://orchestratorURL/identity
- Name ID Format: EmailAddress
-
Application Username: Email
Note: Whenever filling in the URL of the Orchestrator instance, make sure it does not contain a trailing slash. Always fill it in ashttps://orchestratorURL/identity
, nothttps://orchestratorURL/identity/
.
- Single sign on URL: The Orchestrator instance URL +
- Click Show Advanced Settings and fill in the Attribute Statements section:
-
Set the Name field to
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress
and select user.email from the Value drop-down.
-
- Download the Okta certificate.
- In the Feedback section, select the option that suits you and click Finish.
- On the Sign On tab, in the Settings section, click Setup Instructions. You are redirected to a new page containing the instructions required to complete your Orchestrator configuration for SAML
2.0: Identity Provider Sign-On URL, Identity Provider Issuer, X.509 Certificate.Note: If, for any reason, the information about the identity provider is lost, you can, at any point, visit Sign On > Settings > View Setup Instructions.
Assigning People to the Application
linkIn order for a user to be able to use OKTA authentication, he must be assigned the newly created application:
- Log in to OKTA.
- On the Application page, select the newly created application.
- On the Assignments tab, select Assign > Assign to People and then select the users to be given the necessary permissions.
- The newly added users are displayed on the People tab.
Set Orchestrator/Identity Server to Use Okta Authentication
link- Define a user in Orchestrator and have a valid email address set on the Users page.
-
Import the signing certificate:
- For Windows deployments, import the signing certificate provided by the Identity Provider to the Windows certificate store using Microsoft Management Console.
- For Azure deployments, upload the certificate provided by the Identity Provider from in the Azure portal. (TLS/SSL settings > Public Certificates (.cer) > Upload Public Key Certificate). See
here
how to adjust your web app configuration if you are unable to use OKTA authentication and encounter the following error message:
An error occurred while loading the external identity provider. Please check the external identity provider configuration.
- Log in to the Management portal as a system administrator.
- Go to Users and select the Security Settings tab.
-
In the External Providers section, click Configure under SAML 2.0:
The Configure SAML 2.0 panel opens at the right of the window.
-
Set it up as follows:
- Select the Enabled checkbox.
- Set the Service Provider Entity ID parameter to
https://orchestratorURL/identity
. - Set the Identity Provider Entity ID parameter to the value obtained by configuring Okta authentication (see step 9 ).
- Set the Single Sign-On Service URL parameter to the value obtained by configuring Okta authentication (see step 9 ).
- Select the Allow unsolicited authentication response checkbox.
- Set the Return URL parameter to
https://orchestratorURL/identity/externalidentity/saml2redirectcallback
. Make sure to add/identity/externalidentity/saml2redirectcallback
at the end of the URL for the Return URL parameter. This path is specific to Okta as it allows you to reach an Orchestrator environment directly from Okta. - Set the SAML binding type parameter to
HTTP redirect
. - In the Signing Certificate section, set Store name parameter to
My
. - Set the Store location parameter to
LocalMachine
for Windows deployments orCurrentUser
for Azure Web App deployments. -
Set the Thumbprint parameter to the thumbprint value provided in the Windows certificate store. Details here .
Note:Replace all occurrences ofhttps://orchestratorURL
with the URL of your Orchestrator instance.Make sure that the URL of the Orchestrator instance does not contain a trailing slash. Always fill it in ashttps://orchestratorURL/identity
, nothttps://orchestratorURL/identity/
.
- Click Save to save the changes to the external identity provider settings.
- Restart the IIS server.