Okta SSO/OIDC Guide

한국어 버전: https://blog.selectfromuser.com/ko-okta

Select Admin have the ability to configure an Identity Provider to enable Single Sign On (SSO). This article shows how to configure Okta as the primary Identity Provider to faciliate SSO with the Select Admin application for each subdomains.

Contents

  • Supported features
  • Configuration steps
  • Role mapping with Okta Group Claims
  • IdP-initiated SSO
  • Troubleshoot

Supported features

Requirements

  • Admin user who can access to SelectAdmin page.
  • Okta administrator
  • Select Platform: Business plan or higher with a paid add-on subscription.

Configuration steps

(Subject to change)
Okta admin page > Applications > Browse App > Select Admin

App requires "Select Domain" you can find domain from address bar.

In here, Select Domain is hello-okta.selectfromuser.com (please omit prefix "https://")

[1] Gather information from Okta

  1. In the Okta admin page, click on the SelectAdmin application and then navigate to the Sign On tab
  2. Copy the values of Client ID and Client secret (click the eye button to toggle the visibility)
  3. There should be a section that has a link titled OpenID Provider Metadata. Click this link. In the JSON document shown, look for a key titled “issuer” and copy the URL-value

[2] Submit the information to SelectAdmin

  1. In the SelectAdmin page, move to Settings > Security and then click 'Activate' button on the section "OIDC (Okta)"
  2. Paste your values of Client ID, Client secret, Issuer URL (make sure add a postfix /oauth or /oauth/default depends on custom authorization server name) into the form
  3. Open page YOUR_SUBDOMAIN.selectfromuser.com and there should be a new Okta button to continue SSO.

Role mapping with Okta Group Claims

Security > API > Authorization Servers > choose your server (default)

  1. Create a new scope: If not set ever, In the Add scope form, Name should be groups
  2. Create a new claim: In the Add claim form, select ID Token and Always in the dropdown. In the Value type section, select Groups. You can add an optional Filter to limit the groups to sync. (Please filter with prefix, but you can still use .* for all groups)
  3. Enable Group mapping: In the SelectAdmin page, move to Settings > Security and then you can turn on option.
  4. Specify group and roles mappings: Left(group name) is from Okta and Right(admin role) is from SelectAdmin.
Test your account and roles, then turn on Force SSO

IdP-initiated SSO

Users can access SelectAdmin app on the Okta dashboard or browser plugin to sign in by clicking

Troubleshoot

Please contact us with chat or at Slack community.

  • /logout force sign out
  • Without group sync, new user will be created but has no access to the team.
  • Without group sync, same email users are only accessible from Okta.
  • With group sync, mapping of 'Everyone' to 'Viewer' allows all employees can access with no extra grant.
  • With group sync, role update are logged by cloud.
  • Since SelectAdmin do not cache or save groups names from your Okta, there is no validation for group name misspells.
  • For any reason, by request of non-verified admin, we cannot turn off any security option instead of owner.

Read more

주문 데이터 기반으로 티켓 관리 시스템 만들어보기

주문 데이터 기반으로 티켓 관리 시스템 만들어보기

고객을 응대할때 같은 질문을 반복하게 됩니다. 이 고객이 무엇을 샀는지, 지금 주문 상태는 어떤지, 이전에도 같은 이슈가 있었는지. 문의를 처리하는 기존 방법들부터, 주문 데이터를 기준으로 티켓을 정리하면 무엇이 달라지는지를 다룹니다. 복잡한 자동화가 아니라, 검색과 처리에 집중한 최소한의 시작 방법을 정리했습니다.

By Hakbeom Kim