이 페이지는 아직 한국어로 제공되지 않으며 번역 작업 중입니다. 번역에 관한 질문이나 의견이 있으시면 언제든지 저희에게 연락해 주십시오.
Enabling Single Sign-On (SSO) with Okta as your identity provider allows you to simplify authentication and login access to Cloudcraft.
This article helps you set up SSO if your identity provider is Okta. For other identity providers, see the following articles:
For general information on using SSO with Cloudcraft, check out Enable SSO in Your Account.
Setting Up SAML/SSO
- In Cloudcraft, navigate to User > Security & SSO.
- The details you need to create a new application with Okta can be found in the Cloudcraft service provider details section.
- Log in to Okta as an administrator.
- Click Application.
- Click Add Application, then click Create New App.
- Select SAML 2.0 as the sign on method and click Create.
- Enter Cloudcraft as the name of the application and leave the remaining values as-is.
- Click Next.
If you prefer to use an app logo, you can use
this logo which adheres to Okta's size restrictions.
- Next, configure the SAML integration using the details provided by Cloudcraft. The fields are mapped as follows, with the first one being the label in Okta, and the second one being the label at Cloudcraft.
- Single sign on URL: Assertion Consumer Service URL
- Audience URI: Service Provider Entity ID
- On the Name ID format dropdown, select EmailAddress.
- Proceed to the next screen and select I’m an Okta customer adding an internal app to answer the question “Are you a customer or partner?”.
- Click Finish. Now that the application is set up in Okta, you can assign your users to it and once you’re done, navigate to the Sign On tab.
- Under the View Setup Instructions button, click the blue link to download the file required for upload to Cloudcraft.
- Navigate back to Cloudcraft and upload your config file.
- Toggle the SAML Single Sign-On is enabled option.
- If you prefer to have your users access Cloudcraft only via your identity provider, enable the Strict mode option.