
Configuring SAML authentication using App Studio
3 Tasks
1 hr
Pega Platform '24.2
Advanced
Pega Platform '24.2
English
Scenario
MDC is considering using Single sign-on (SSO) with SAML to authenticate operators. As a Lead System Architect, your task is to design and implement a SAML authentication as a proof of concept.
There are many identity providers (IdPs) that are available in the marketplace; some are free services while others charge each user. Before MDC decides on an identity provider, they ask you to develop a proof of concept with Okta as the IdP. Okta is a leading IdP that offers secure and scalable identity management solutions. When integrated with Pega Platform™ for business process management and customer engagement, Okta provides seamless authentication and authorization services. This integration enhances security by enabling SSO for Pega applications.
The following table provides the credentials you need to complete the challenge:
Role | User name | Password |
---|---|---|
Admin | admin@deliveryservice | rules |
Before you begin:
- Register on the Okta developer site.
- On the Okta developer homepage, click Sign up, and then click Sign up free for Developer Edition.
Note: It is free to test, explore, and manage integrations.
- Create an Okta Developer Edition Service account.
- Complete the sign-up process.
Detailed Tasks
1 Configure Okta as the identity provider
- Log in to Okta Admin Console.
- In the navigation pane, click Applications > Applications, and then click Create App Integration.
- On the Create a new app integration landing page, in the Sign-in method section, select SAML 2.0.
- Click Next.
- Complete the General Settings section:
- In the App name field, enter Pega.
- Leave the App logo(optional) field empty.
- In the App visibility section, leave the Do not display application icon to users radio button clear.
- Click Next.
- In the Assignments section, configure the access control options:
- In the Controlled access section, select Allow everyone in your organization to access.
- In the Enable immediate access (Recommended) section, clear the Enable immediate access with Federation Broker Mode checkbox.
- Click Save.
- Complete the Configure SAML settings section:
- In the Single sign-on URL field, enter https://<your-pega-server>/prweb/PRRestService/WebSSO/SAML/v2/AssertionConsumerService. Replace “your-pega-server" with your application specific host name and port number.
- In the Audience URI (SP Entity ID) field, enter RandomId.
- Leave the Default Relay State field empty.
- In the Name ID format field, select Unspecified.
- In the Application username field, select Okta username.
- In the Update application username on list, select Create and update.
- Click Save.
- Complete the Attribute Statements (optional) section:
- In the Name filed, enter user.firstName.
- In the Email field, enter user.email.
- Complete the Feedback section:
- In the App type field, select the This is an internal app that we have created checkbox.
- Click Finish.
- Review the SAML setup configuration, and then make a note of the Metadata URL.
- In the navigation pane, click Directory > People, and then click Add person.
- In the Add person dialog box, configure the user details:
- In the User type list, select User
- In the First name field, enter CLSA.
- In the Last name filed, enter POC.
- In the Username field, enter [email protected].
- In the Primary email filed, enter [email protected].
- Leave the Groups (optional) field empty.
- In the Activation field, select Activate now.
Note: You can either set a password for the user or enable Okta to generate a temporary password. If you set your own password, enter it in the provided fields.
- In the navigation pane, click Applications > Applications, and then open the Pega application that you created.
- On the Assignments tab, click Assign to select the users or groups who should have access to the application.
2 Create the new SSO in App Studio
- In the Pega Platform instance for the challenge, enter the following credentials:
- In the User name field, enter admin@deliveryservice.
- In the Password field, enter rules.
- In the header of Dev Studio, click Dev Studio > App Studio.
- In the navigation pane of App Studio, click Users.
- Click Authentication.
- Click Add authentication service, and then, in the list, select Create new > SAML2.
- In the Name filed, enter SAMLPoc.
- In the Create new single sign-on (SAML 2.0) window, click Import metadata and then enter the metadata URL of Okta (https://dev-33414028-admin.okta.com/app/exkjemeaj8Rdaau3q5d7/sso/saml/metadata).
Note: You must replace the host name with your Okta admin registration.
- Click Submit.
- In the Map operator ID from claim section, select NameID.
- Select the Create operators for new users checkbox.
- In the Access role list, select DeliveryService:Authors.
- Click Submit.
- Confirm that the new SAMLPoc authentication service Rule is displayed with an Enabled status.
3 Set Pega as the service provider
- In the header of App Studio, click App Studio > Dev Studio.
- Search for and open the SAMLPoc authentication service Rule.
- In the Entity Identification, copy the value for the SAML authentication service.
- Return to the Okta Admin Console, click Applications > Applications, and then open the Pega application.
- In the General Settings section, click Edit.
- Update the Audience URI (SP Entity ID) with the Pega Platform Entity Identification that you captured in step 3.
Confirm your work
- Return to Dev studio, and then in the SAMLPoc authentication service Rule, copy the login URL.
- Open a different web browser.
For example, if you are using Chrome, open Firefox. - Paste the Login URL into the new web browser, wait for it to redirect to Okta, and then enter your Okta user credentials.
After you sign in, the system automatically creates the Operator ID instance for [email protected] and assigns the ID with the selected access role, as shown in the following figure:
Available in the following missions:
If you are having problems with your training, please review the Pega Academy Support FAQs.
Want to help us improve this content?