Applies to: Kyvos Enterprise Kyvos Cloud (SaaS on AWS) Kyvos AWS Marketplace
Kyvos Azure Marketplace Kyvos GCP Marketplace Kyvos Single Node Installation (Kyvos SNI)
Okta uses SAML 2.0 protocol to communicate with web applications (like Kyvos) for carrying on SSO. To use Okta for external authentication in Kyvos, enable SAML for the Kyvos Web application.
To know more about SAML 2.0, click here.
Prerequisites
To enable SAML for Kyvos, you must have the following certificate files
X.509 certificate file
Service Provider Key File
Register the Kyvos application with your Okta account, and generate and download the following:
Single Sign-On URL
Identity Provider Issuer
X.509 Certificate File
SAML configuration in Kyvos Manager
To configure SAML2.0 as an external authentication provider for the Kyvos Web Portal, perform the following steps.
On the Kyvos Manager, navigate to Security > Web based SSO page.
Select the Enable External Authentication checkbox to define the external authentication mechanism for the Kyvos Web portal.
Select the SAML2.0 option from the Provider list.
Enter details as:
Parameter/Field Comments/Description Header Name Enter the name of the HTTP header that contains the user name in the HTTP request. Header Type Select the type of value to be sent by the external authentication tool as an SSO token. Error Redirection URL Enter the URL to which the user will be redirected if there is an error in authenticating the Kyvos application with SAML2.0. This option is displayed only if SAML2.0 is selected as an external authentication provider.
Both relative and absolute URLs are supported.
Example: /error/exception.jsp and http://host:port/appnameService Provider Single Sign-On Return URL Enter the Kyvos Web Portal URL, on which the application redirects after a single sign-on. Service Provider Issuer Enter the name of the service provider issuer to identify your Kyvos Server installation to the Identity Provider. You can use your Kyvos Web Server URL here. X.509 Certificate File Upload the standard format certificate (X.509) file. This is a Privacy Enhanced Mail (PEM)-encoded x509 certificate with the .crt file extension. Service Provider Key File Upload the service provider's private key file. This is an RSA or DSA private key file with .key extension. This is not password protected. Single Logout URL Enter the identity provider's single sign-out URL. Single Sign-On URL Enter a single sign-on URL. This is the URL generated by SAML2.0 while integrating the Kyvos application. Identity Provider Issuer Enter identity provider issuer as generated by SAML2.0. X.509 Certificate File Upload the X.509 certificate file for SAML2.0. Click the Save button to save changes.
Verifying configuration in Kyvos Manager
Once the settings are saved, verify the values of these properties in the Kyvos Manager.
For this, click Manage Kyvos Properties. The Properties page is displayed.
In the kyvosclient.properties verify the values for the following.
Property Name
Description
Value
EXT_AUTH_ENABLED
Enable/disable the access to Kyvos application using external authentication
Yes
EXT_AUTH_INSTANT_LOGIN
Enable/disable the native Kyvos login along with the external authentication
Yes
EXT_AUTH_PROVIDER
Name of the external authentication provider.
Possible values: SAML2.0 and HOST_APPSAML2.0
EXT_AUTH_HEADER_ID
In case of HOST_APP authentication, custom header will be sent against the key specified here.
username
EXT_AUTH_PARAMETER_VALUE_TYPE
Indicates what information is provided in EXT_AUTH_HEADER_ID parameter.
Possible values: username, sessionid, or email.USERNAME
EXT_AUTH_ERROR_REDIRECT_URL
In case of error in authentication, the Kyvos application will be redirected to this URL.
By default, the application will be redirected to Kyvos login page.Value given in the Error Redirection URL field.
EXT_AUTH_SIGN_OUT_REDIRECT_URL
In case of logout in authentication, the Kyvos application will be redirected to this URL.
By default, the application will be redirected to Kyvos login page.Value given in the External Authentication Sign-Out URL
EXT_AUTH_HOMEPAGE_URL
In case of integration, the external app will be redirected to this URL on session timeout.
Mandatory to set this in case integration is through Kyvos session sharing mechanism.In the olapengine.properties verify the values for the following.
Property Name | Description | Value |
---|---|---|
CLIENT_URL | Defines the REST API URL for validating SSO by the BI Server. | The Kyvos web URL configured in your environment. |