Okta SSO
Set up Okta SSO to log in to the Panther Console
Overview
Panther supports integrating with Okta as a SAML provider to enable logging in to the Panther Console via SSO.
For more information on features, terminology, and limitations of SSO integrations with the Panther Console, see Identity & Access Integrations.
How to configure SAML SSO to the Panther Console with Okta
Step 1: Obtain the Okta SSO parameters from Panther
Log in to the Panther Console.
In the upper-right corner, click the gear icon, and then click General.
Navigate to the Identity & Access tab.
Next to Enable SAML (Security Assertion Markup Language), set the toggle to
ON.(Optional) If using IdP-initiated login, set the Use IdP-Initiated Single Sign On (SSO) toggle to
ON.Copy the the Audience and ACS Consumer URL values and store them in a secure location. You will need them in the following steps.
If using IdP-initiated login, also copy the Relay State value.

Step 2: Create the Panther application in Okta
Log in to your Okta administrative console.
In the left-hand navigation bar, click on Applications, and then click Create App Integration.
Within the "Create a new app integration" screen, select SAML 2.0 as your "Sign-in method":

Click Next.
Configure the general settings:
App name: Add a memorable name such as "Panther Console."
App logo: Upload a Panther logo to help users quickly identify this app.
App visibility: Configure the visibility of this application for your users.
Click Next.
In the SAML Settings section, configure the following under General:
Single sign-on URL: Paste the ACS Consumer URL value you obtained in the Panther Console in Step 1.
Audience URI (SP Entity ID): Paste the Audience value you obtained in the Panther Console in Step 1.
(Optional) Default RelayState: If using IdP-initiated login, paste the Relay State value you copied from the Panther Console in Step 1. If using SP-initiated login, leave this value blank.

Scroll down to the Attribute Statements section. Configure the following attributes:
Name:
PantherEmail, Value:user.emailName:
PantherFirstName, Value:user.firstNameName:
PantherLastName, Value:user.lastName

The Group Attribute statements can be left blank. Click Next.
Click Finish.
In the Settings section, copy the Metadata URL. This value will be needed in Step 3.

You can now grant access to the appropriate users and groups in the Assignments tab.
Step 3: Configure Okta SAML in Panther
Navigate back to the Identity & Access section in the Panther Console from Step 1. In the Default Role field, choose the Panther role that your new users will be assigned by default when they first log in via SSO.
Panther highly recommends not setting this value to
Admin.Paste the Metadata URL value you copied at the end of Step 2 into the Identity Provider URL field.
Click Save Changes.
To test your setup, go to your Panther sign-in page and click Login with SSO.

Step 4 (For SP-Initiated SSO): Create a Panther Bookmark app in Okta
To configure a Bookmark app for Panther, follow the instructions in the Okta documentation: Simulate an IdP-initiated flow with the Bookmark App.
When you're asked to enter "the URL for your domain at the external site," use the URL of your Panther sign-in page. This is the URL that appears in your browser's URL bar when you log out of your Panther Console.
Last updated
Was this helpful?

