Step 6 — For Okta: Create IdP Profile, Import Metadata, and Edit Settings in ExtremeCloud IQ

To see the Enable SSO Global Settings option, log in to ExtremeCloud‌ IQ using the SSO URL, https://sso.extremecloudiq.com/login?sso=true.

Note

Note

Single Sign-on integration can only be configured by ExtremeCloud‌ IQ users with Administrator permissions in their home account (VIQ). External administrators cannot access the SSO configuration page when administering other customer accounts.
  1. In ExtremeCloud‌ IQ, select your name in the top right corner, and then select Global Settings.
  2. Select Enable Single Sign On (SSO).
  3. Select Add IdP Profile.
  4. On the Type tab, select Okta.
  5. On the Profile tab, enter the fully qualified Domain name for which you want to provide single-sign on, and then select Continue.
    Note

    Note

    You can only define a single domain name per integration. If your IdP supports multiple domains, you must create a separate IdP profile for each domain.
  6. On the IdP Connection tab, select Import from URL.
  7. In the ISP Metadata URL field, paste the URL captured in Step 5, and then select Import.
    After successful import, metadata from Okta displays.
    Note

    Note

    There might be some critical elements not included in the Okta metadata. If the SLO URL and SLO Response URL fields are blank, enter placeholder values in each field, which we can update in a subsequent step.
  8. To supply the placeholder values, copy the SSO URL and paste the value into the SLO URL and SLO Response URL fields.
  9. From the Choose Certificates list, ensure the certificate that was included in the Metadata import is selected, and then select Continue.
    Click to expand in new window
    ExtremeCloud IQ - Placeholder Values for Single Logout
    ExtremeCloud IQ - Placeholder Values for Single Logout
  10. On the Attribute Mapping page, enter the following values:
    • First Name: user.firstName
    • Last Name: user.lastName
  11. Select Add a group name mapping for each Okta group to map to an ExtremeCloud‌ IQ role.
  12. In the IdP group field, enter the name of your Okta group, and then select the ExtremeCloud‌ IQ role to map any users in the group.
    Add additional mappings as needed.
    Note

    Note

    Each of the values for First Name, Last Name, and Group Name are case sensitive. Ensure that what you enter here exactly matches the information in Okta. The list is applied from top to bottom, with the first match taking precedence. If a user belongs to multiple groups listed here, they will be assigned the XIQ role based on the order you specify.
  13. Select a Default RBAC role assignment to assign a default permission for users that log into ExtremeCloud‌ IQ, but are not a member of an explicitly defined group.
    • If you select Deny User Login, a user that successfully logs into ExtremeCloud‌ IQ with their Okta credentials, but is not in an Okta group mapped to XIQ RBAC role, is denied access to the application.
    • If you select Allow User Login and assign default user group, a user that successfully logs into ExtremeCloud‌ IQ with their Okta credentials, but is not in an Okta group mapped to XIQ RBAC role, is mapped to the role defined here.
  14. Select Save & Finish.