Aerobase with Okta SAML Provider
Okta, an identity platform, can be used for digital businesses to simplify authentication and authorization processes for service providers, identity providers, and of course users. This will allow users to be able to use one set of credentials for multiple websites and applications. To integrate Aerobase with Okta Security Assertion Markup Language (SAML) Provider, Aerobase and Okta need to be configured in parallel.
To test the OKTA identity provider you will need to register your own trial OKTA organization here.
To do so, you need to:
-
Add a SAML provider in Aerobase
-
Add a SAML application in Okta
-
Import the SAML application metadata into the provider

To add a SAML identity provider in Aerobase:
-
Access the Aerobase Admin page, using the URL http://[FQDN or IP]/auth/admin/kryon/console/#/realms/kryon.
-
Go to Identity Providers (under Configure on the left pane).
-
Select the SAML v2.0 provider from the list of providers.
Aerobase SAML Identity Providers documentation is here.
Configure SAML identity provider in Aerobase
To configure a SAML identity provider in Aerobase:
Copy the Redirect URI, and keep this window open for now.
-
In the Aerobase Admin page, go to Identity providers (under Configure on the left pane).
-
Under Add Identity Provider, provide the alias.
Note: It is part of Redirect URI

To add a SAML application in Okta:
-
Sign in to your Okta application and go to the Admin Panel.
-
Under Applications in the Admin Console, select Create a New Application Integration.
-
Select SAML 2.0 from the Sign on method options.
-
Click Create.
-
In the General Settings, provide the application name.
-
Click Next.
-
Copy Aerobase’s Redirect URI to Single sign on URL and Audience URI (SP Entity ID) settings.
-
Configure the App type and click Finish.
Copy the metadata link
Now that the application is added to Okta, we need to copy the Identity Provider metadata link under Sign on Settings and import it into Aerobase.
You need to assign people to the application (see below).

To Import Okta SAML metadata into Aerobase:
-
In Aerobase, go to Import (under Manage on the left pane).
-
Paste the metadata link into the Import from URL area.
-
Click Import and Save.
Disable the email verification option:
In Aerobase, go to Authentication (under Configure), click the Required Actions tab, and deselect Enable of Verify Email.

Define OKTA user groups. Each user group will stand for the particular user role in the Nintex system.
To add user groups:
-
In the Okta application Admin Panel, go to Groups (under Directory on the left pane).
-
Click Add Group.
-
Add these groups by typing into the text box:
-
studio-developer
-
admin-access
-
admin-catalog
-
admin-license
-
admin-permissions
-
-
Click on an added group, and select the Apps tab to link each created group to the OKTA application (groups created above).
-
Click KryonTestPD.
To create OKTA user accounts and link them to the appropriate groups (roles):
To check, you can go to Directory > People > Person and Username to make sure you can see your newly-added user
-
In the Okta application, go to People (under Directory on the left pane).
-
Click Add person.
-
Select User as the User type
-
Username/Primary email can be the same
-
Select Set by admin by Password
-
Enter Password: Nintex123456!
-
-
Click Save.
Next Steps:
Follow these instructions: