# Okta SSO

## Overview

Panther supports integrating with Okta as a SAML provider to enable logging in to the Panther Console via SSO.

For more information on features, terminology, and limitations of SSO integrations with the Panther Console, see [Identity & Access Integrations](https://docs.panther.com/system-configuration/saml).

## How to configure SAML SSO to the Panther Console with Okta

### Step 1: Obtain the Okta SSO parameters from Panther

1. Log in to the Panther Console.
2. In the upper-right corner, click the gear icon, and then click **General**.
3. Navigate to the **Identity & Access** tab.
4. Next to **Enable SAML (Security Assertion Markup Language)**, set the toggle to `ON`.
5. If using [IdP-initiated login](https://docs.panther.com/system-configuration/saml/..#idp-initiated-vs.-sp-initiated-login), set the **Use IdP-Initiated Single Sign On (SSO)** toggle to `ON`.
6. Copy the the **Audience** and **ACS Consumer URL** values and store them in a secure location. You will need them in the following steps.
   * If using IdP-initiated login, also copy the **Relay State** value.

{% hint style="info" %}
It's recommended to use [SP-initiated login](https://docs.panther.com/system-configuration/saml/..#sp-initiated-login-recommended), as it is generally considered more secure than IdP-initiated login.
{% endhint %}

<figure><img src="https://4011785613-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LgdiSWdyJcXPahGi9Rs-2910905616%2Fuploads%2Fgit-blob-800628a71753e4ef33d50d9bbf9231f05441120b%2FScreenshot%202025-10-10%20at%203.03.25%E2%80%AFPM.png?alt=media" alt="In the Settings section of the Panther Console, within the Identity &#x26; Access tab, various fields like &#x22;Enable SAML&#x22;, &#x22;Audience&#x22; and &#x22;ACS Consumer URL&#x22; are shown"><figcaption></figcaption></figure>

### Step 2: Create the Panther application in Okta

1. Log in to your Okta administrative console.
2. In the left-hand navigation bar, click on **Applications**, and then click **Create App Integration**.
3. Within the "Create a new app integration" screen, select **SAML 2.0** as your "Sign-in method":

   <figure><img src="https://4011785613-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LgdiSWdyJcXPahGi9Rs-2910905616%2Fuploads%2Fgit-blob-fe4523b56e7ae149b039df4d93c1ba6b1ce50bca%2Fimage.png?alt=media" alt=""><figcaption></figcaption></figure>
4. Click **Next**.
5. Configure the general settings:
   * **App name**: Add a memorable name such as "Panther Console."
   * **App logo**: Upload a Panther logo to help users quickly identify this app.
   * **App visibility**: Configure the visibility of this application for your users.
6. Click **Next**.
7. In the **SAML Settings** section, configure the following under **General**:

   * **Single sign-on URL**: Paste the **ACS Consumer URL** value you obtained in the Panther Console in Step 1.
   * **Audience URI (SP Entity ID)**: Paste the **Audience** value you obtained in the Panther Console in Step 1.
   * **Default RelayState:** If using IdP-initiated login, paste the **Relay State** value you copied from the Panther Console in Step 1. If using SP-initiated login, leave this value blank.

   <figure><img src="https://4011785613-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LgdiSWdyJcXPahGi9Rs-2910905616%2Fuploads%2Fgit-blob-98aaf036a042fbaf0e3ce7cd62804eef5820649e%2FScreenshot%202025-10-10%20at%203.38.44%E2%80%AFPM.png?alt=media" alt="&#x22;SAML Settings&#x22; section in the Okta Console with various fields like &#x22;Single sign-on URL&#x22; and &#x22;Audience URI&#x22;" width="563"><figcaption></figcaption></figure>
8. Click **Next**.
9. Click **Finish.**
10. You will be navigated to the created app's Settings page. Click the **Sign On** tab. Scroll down to the **Show legacy configuration** sectio&#x6E;**.** In the **Profile Attribute Statements** section, configure the following attributes:

    * **Name**: `PantherEmail`, **Value**: `user.email`
    * **Name**: `PantherFirstName`, **Value**: `user.firstName`
    * **Name**: `PantherLastName`, **Value**: `user.lastName`

    <figure><img src="https://4011785613-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LgdiSWdyJcXPahGi9Rs-2910905616%2Fuploads%2FxER3co1b9qsznJu1wFW3%2FUntitled%2010.heic?alt=media&#x26;token=f06dbe47-e002-44bd-86bd-07a40ae8f4ba" alt=""><figcaption></figcaption></figure>

    <figure><img src="https://4011785613-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LgdiSWdyJcXPahGi9Rs-2910905616%2Fuploads%2FYugukmHR24F8uqGom0Fn%2FUntitled%2010.png?alt=media&#x26;token=1f7aa155-b664-4b38-819e-da9528597cfc" alt=""><figcaption></figcaption></figure>
11. The Group Attribute statements can be left blank. Click **Save**.
12. In the **Settings** section, copy the **Metadata URL.** This value will be needed in Step &#x33;**.**

    <figure><img src="https://4011785613-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LgdiSWdyJcXPahGi9Rs-2910905616%2Fuploads%2Fgit-blob-474996f7383f7eec6c58a8b65f037620c09111d0%2FScreenshot%202025-10-01%20at%201.53.28%E2%80%AFPM.png?alt=media" alt="Settings page for an Okta application with a red box around &#x22;Metadata details&#x22;" width="563"><figcaption></figcaption></figure>
13. You can now grant access to the appropriate users and groups in the **Assignments** tab.

### Step 3: Configure Okta SAML in Panther

1. Navigate back to the **Identity & Access** section in the Panther Console from Step 1. In the **Default Role** field, choose the Panther role that your new users will be assigned by default when they first log in via SSO.

{% hint style="warning" %}
Panther highly recommends not setting this value to `Admin`.
{% endhint %}

2. Paste the **Metadata URL** value you copied at the end of Step 2 into the **Identity Provider URL** field.
3. Click **Save Changes**.

To test your setup, go to your Panther sign-in page and click **Login with SSO**.

<div data-full-width="true"><figure><img src="https://4011785613-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-LgdiSWdyJcXPahGi9Rs-2910905616%2Fuploads%2Fgit-blob-5e5aa7beb6e3547f6c0d323432359430390a0067%2Fpanther-login-sso%20(6)%20(1).png?alt=media" alt="The Panther login page displays a &#x22;Login with SSO&#x22; button at the bottom."><figcaption></figcaption></figure></div>

### Step 4 (For SP-Initiated SSO): Create a Panther Bookmark app in Okta

{% hint style="info" %}
Service Provider (SP) initiated SSO provides a more secure alternative to IdP-initiated SSO. Okta app tiles cannot be used directly for SP-initiated login. Instead, use Okta Bookmark Apps to provide users with a seamless login experience.

If you created a Panther application tile in Okta, hide it to prevent user confusion with the Bookmark app. See the [Okta documentation for instructions on hiding applications](https://help.okta.com/oag/en-us/content/topics/access-gateway/add-app-saml-pass-thru-hide.htm).
{% endhint %}

* To configure a Bookmark app for Panther, follow the instructions in the Okta documentation: [Simulate an IdP-initiated flow with the Bookmark App](https://help.okta.com/en/prod/Content/Topics/Apps/Apps_Bookmark_App.htm).
  * When you're asked to enter "the URL for your domain at the external site," use the URL of your Panther sign-in page. This is the URL that appears in your browser's URL bar when you log out of your Panther Console.


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.panther.com/system-configuration/saml/okta.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
