Okta SSO
Set up Okta SSO to log in to the Panther Console
Last updated
Set up Okta SSO to log in to the Panther Console
Last updated
Panther supports integrating with Okta as a SAML provider to enable logging in to the Panther Console via SSO.
For more information on features, terminology, and limitations of SSO integrations with the Panther Console, see Identity & Access Integrations.
Log in to the Panther Console.
Click the gear icon in the upper right. In the dropdown menu, click General.
Click the Identity & Access tab.
Keep this browser window open, as you will need the Audience and ACS URL values in the next steps.
Log in to your Okta administrative console.
Click the Applications tab, then click Create App Integration.
Within the "Create a new app integration" modal, fill in the form to configure the new app:
Click Next.
Configure the general settings:
App name: Add a memorable name such as "Panther Console."
App logo: Upload a Panther logo to help users quickly identify this app.
App visibility: Configure the visibility of this application for your users.
Click Next.
In the SAML Settings section, configure the following under General:
Single sign on URL: Enter the ACS URL you copied from the Panther Console in earlier steps of this documentation.
Audience: Enter the Audience you copied from the Panther Console in earlier steps of this documentation.
Configure the following under Attribute Statements:
Name: PantherEmail
, Value: user.email
Name: PantherFirstName
, Value: user.firstName
The Group Attribute statements can be left blank. Click Next.
Click Finish.
On the next screen, navigate to SAML Setup along the right-hand side of the screen.
Click View SAML setup instructions which will open up a new browser tab.
Copy the Identity Provider Single Sign-On URL. Okta displays the URL in one of the following formats:
https://[OKTA_ACCT].okta.com/app/[OKTA_APP_STR]/[APP_ID]/sso/saml
https://okta.[OKTA_ACCT].com/app/[OKTA_APP_STR]/[APP_ID]/sso/saml
Adjust the URL as follows in order to use it with Panther. If your domain matches the first pattern above, use the first option here; if your domain matches the second pattern above, use the second one here:
https://[OKTA_ACCT].okta.com/app/[APP_ID]/sso/saml/metadata
https://okta.[OKTA_ACCT].com/app/[APP_ID]/sso/saml/metadata
Copy this URL as you will need it in the following steps.
Grant access to the appropriate users and groups in the Assignments tab.
IdP-initiated logins (i.e., logging in to Panther from Okta) are not supported due to a limitation with Amazon Cognito, which powers Panther's user management. However, you can simulate an IdP-initiated login flow by creating a Panther Bookmark app in Okta. This, while technically a service provider (Panther)-initiated login, will allow users to click a tile in Okta to sign in to Panther.
If a Panther application tile was created in Okta during the previous step, it's recommended to hide it to prevent user confusion with the Bookmark app. See the Okta documentation: Hide applications.
To configure a Bookmark app for Panther:
Follow the instructions in the Okta documentation: Simulate an IdP-initiated flow with the Bookmark App.
When you're asked to enter "the URL for your domain at the external site," use the URL of your Panther sign-in page. This is the URL that appears in your browser's URL bar when you log out of your Panther Console.
Navigate back to the SAML configuration you started earlier in this documentation.
Next to Enable SAML, set the toggle to ON.
In the Default Role field, choose the Panther role that your new users will be assigned by default when they first log in via SSO.
In the Identity Provider URL field, paste the metadata URL from Okta that you obtained in the previous steps of this documentation.
Click Save Changes.
To test your setup, go to your Panther sign-in page and click Login with SSO.
Sign on Method: Select SAML 2.0
Name: PantherLastName
, Value: user.lastName