Skip to main content

Creating an Application and Attributes in Okta

Create an Access Analyzer Application in Okta Using the WS-Fed Template

Follow the steps to create an Access Analyzer Application in Okta Using the WS-Fed Template:

Step 1 – Log in to Okta.

Step 2 – In the left-pane menu, expand Applications and then click Applications.

Step 3 – Click Create App Integration.

Okta Browse App Integration Catalog

Step 4 – Browse the App Integration Catalog and select Template WS-Fed.

Step 5 – Click Create. Name the application Access Analyzer.

Retrieve the Values to Paste into the Access Analyzer WebServer.exe.config File

Okta Application copy link address

Step 1 – In the Access Analyzer application, click the Sign On tab.

Step 2 – Right click on the Identity Provider metadata link and select Copy Link Address to get the value for the WSFederationMetadata URL.

Step 3 – Click on the General tab to copy the value for the Realm. This value will be unique per tenant.

https://www.okta.com/<YOURVALUEHERE>

Step 4 – Construct the ReplytoURL using the FQDN of your Access Analyzer server:

https://FQDNofaccessanalyzerserver.com:8082/federation

Edit the WebServer.exe.config File

Follow the steps to edit the WebServer.exe.config file:

Step 1 – Open the WebServer.exe.config file with a text editor, such as Notepad++. It is located in the Web folder within the Access Analyzer installation.

Step 2 – Change the value for the BindingUrl parameter from http to https:

<add key="BindingUrl" value="https://+:8082" />

Okta application values in WebServer.exe.config file

Step 3 – Update the following values in the WebServer.exe.config file with the values retrieved from the Access Analyzer Okta application.

CAUTION: These values are case sensitive. The values used here must match the values in the Access Analyzer Okta application.

  • WSFederationMetadata – Paste the copied link address into the WebServer.exe.config file as:

    <add key="WsFederationMetadata" value="INSERT URL HERE" />
  • WSFederationRealm – Paste the value for the Realm into the WebServer.exe.config file as:

    <add key="WsFederationRealm" value="INSERT URL HERE" />
  • WSFederationReply – Enter the value for the WSFederationReply based on the FQDN of the Access Analyzer server and port into the Webserver.exe.config file as:

    <add key="WsFederationMetadata" value="INSERT URL HERE" />

Step 4 – Restart the Access Analyzer Web Server.

Configure the App Settings for the StealthAUDIT Application

Step 1 – In the Access Analyzer application, navigate to the General Tab and click Edit to populate the following fields.

oktaprofileeditor

Step 2 – Navigate to the Directory menu and select Profile Editor from the drop-down menu. Click the Edit Profile button for the Access Analyzer application.

Okta Add Attribute button

Step 3 – Click Add Attribute to open the Add Attribute window.

Okta Add Atrribute window

Step 4 – In the Add Attribute window, add the following attributes:

  • Username
  • SID
  • samaccountname
  • upn
  • department

NOTE: The case of the attributes in bold must match the case used in the custom attribute.

Click Save to save the attribute details and close the Add Attribute window. To add another attribute, click Save and Add Another.

To Okta option under the Directory Provisioning Tab

Step 5 – Navigate to the Directory menu and click on the Provisioning tab. Click To Okta.

Okta Show Unmapped Attributes

Step 6 – Locate and map the attributes that were added for the profile by clicking the Pencil icon to edit attributes. To locate the attributes, scroll down and select Show Unmapped Attributes.

Okta Unmapped Attribute configuration window

Step 7 – Click the pencil icon for SID, upn, and samAccountName to map the attributes. They will display in the mapped section.

Step 8 – Click Save and return to the Okta Attribute Mappings page.

Okta Attribute Mappings Force Sync

Step 9 – On the Okta Attribute Mappings page, click Force Sync. The new attributes will display for any user under the profile.

To configure Okta Multi-Factor Authentication, see the Setting Up Multi-Factor Authentication topic for additional information.

Setting Up Multi-Factor Authentication

Follow the steps to configure multi-factor-authentication for Access Analyzer:

Okta MFA App Sign on Rule window

Step 1 – Navigate to the Sign On Policy page and click Add Rule. The App Sign On Rule opens. Configure the following options:

  • Rule Name – Name of the rule
  • Conditions – Select whether the rule applies to either the Users assigned to this app or The following groups and users.

Okta MFA App Sign on Rule window Access section

Step 2 – Scroll down to the Access section. Check the Prompt for factor box and select Every Sign On. Click Save.

Multi-Factor Authentication is now configured for Access Analyzer.