OKTA SAML Configuration
OKTA SAML Configuration
Pre-requisites:
l Ensure WebAPI, PUI, and CAT security are configured using HTTPS.
l Set CoLOS security level to medium or high before proceeding.
2. Enter the required information and click Sign up. You will receive the verification email,
Click Active.
3. Follow the instructions to create new password and click Reset Password.
4. Click Setup and verify your password.
2/75
5. Download and install the Okta verify app on your mobile device.
6. Set up your account in the app and enter the verification code. Click Verify.
Managing Users
Adding a New User
1. Log in to the OKTA portal.
2. Go to Directory People.
3. Click Add person.
4. Enter the required user details.
5. Click Save.
3/75
Result: The new user is created in the directory.
Groups
Creating a Group
1. Go to Directory Groups.
2. Click Add group.
3. Enter the required information for the group. Use the following format for group names:
OKTA-COLOS<Role Name> (e.g., OKTA-COLOS_Administrator).
4. Click Save.
4/75
3. Click the Assign people tab and Select + next to the user to add them to the group.
5/75
3. Select SAML 2.0 as the sign-in method, then click Next.
4. On General settings page, enter the app name (e.g., CoLOS Administrator (SAML).
6/75
5. On Configure SAML Page, In SAML settings, enter:
o The Signle Sign-on URL- https:/Server-
name:9340/UserAuthApi/SamlLoginResponse.
7/75
n Group Prefix: OKTA-COLOS_
Leave the Group prefix field blank if the group name doesn’t have
a prefix (e.g., group name: Administrator).
7. Select " It's required to contact the vendor to enable SAML" radio button. Click Finish
8/75
Result: The CoLOS Administrator application is added to OKTA.
8. Go to specifc application, navigate to Sign On tab. Click View SAML setup instruc-
tions to download the certificate.
9. Note the Identity Provider Single Sign-On URL and Identity Provider Issuer and
download the certificate.
9/75
Assigning App to the Groups
1. Go to the Applications tab, Select the application, then navigate to the Assign-
ments tab.
2. Click Assign and select Assign to Groups.
3. Choose the desired group from the list, then click Assign andDone.
10/75
Assigning App to the Users
1. Go to the Applications tab, Select the application, then navigate to the Assign-
ments tab.
2. Click Assign and select Assign to People.
3. Choose the users to assign, then click Assign and Done.
2. Go to Search bar and type Services. Search for Markem-imaje Connectivity, right click
and Select Restart.
11/75
3. Go to Security Level, Select High Security. Choose SAML 2.0 - XML Based
Authentication from the Protocol drop down. Click Configure.
12/75
l Group Prefix: OKTA-COLOS_
Leave the Group prefix field blank if the group name doesn’t have
a prefix (e.g., group name: Administrator
4. Restart the CoLOS application, then log in using your OKTA credentials.
Click CoLOS User Login to login with your CoLOS login credentials.
13/75
Adding CoLOS Designer Application in OKTA
1. Log in to the OKTA portal using an account with administrative rights (https://okta-
devok12.okta.com/).
2. Go to the Applications tab.
3. Click Create App Integration.
5. On General settings page, enter the app name e.g., "CoLOS Designer (SAML)".
14/75
6. In Configure SAML Page,
o The Signle Sign-on URL - https://Server-
name:9340/UserAuthApi/SamlLoginResponse
15/75
The Group prefix is the prefix of CoLOS groups created in the
identity platform (e.g., If the group name is OKTA-COLOS_Admin-
istrator, then the group prefix is OKTA-CoLOS_)
Leave the Group Prefix field blank if there is no prefix. (e.g., group
name: Administrator).
8. Select the radio button " It's required to contact the vendor to enable SAML", then click
Finish
16/75
Result: The app is created.
9. Go to specifc application, navigate to Sign On tab. Click View SAML setup instruc-
tions to download the certificate.
10. Note the Identity Provider Single Sign-On URL and Identity Provider Issuer and
download the certificate.
17/75
Assigning CoLOS Designer App to the Groups
1. Go to the Applications tab, Select the application adn navigate to the Assignments
tab.
2. Select Assign and click Assign to Groups.
3. Select the group from the list and click Assign and Done.
18/75
Assigning App to the Users
1. Go to the Applications tab , Select the application and navigate to the Assignments
tab.
2. Select Assign and Click Assign to People.
3. Choose the users to assign, then click Assign and Done.
Repeat the above procedure to integrate other CoLOS applications with Iden-
tity platform.
19/75
2. Go to Search bar and type Services. Search for Markem-imaje Connectivity, right click
and Select Restart.
3. Go to Security Level, Select High Security. Choose SAML 2.0 - XML Based
Authentication from the Protocol drop down. Click Configure.
20/75
l Audience URL: http://www.provider.com/Audience
Leave this blank if the group name does not have a prefix.
21/75
Authentication needs to be successful in Test Information
4. Restart the CoLOS application, then log in using your OKTA credentials.
Click CoLOS User Login to login with your CoLOS login credentials.
22/75
5. On theGeneral settings page enter the app name, e.g., "CoLOS Design Control
SAML".
23/75
7. In Group Attribute Statements (optional):
n Name: Groups
n Filter: Start with
n Group Prefix: OKTA-COLOS_
24/75
8. Select the radio button " It's required to contact the vendor to enable SAML", then click
Finish
9. Go to specifc application, navigate to Sign On tab. Click View SAML setup instruc-
tions to download the certificate.
25/75
10. Note the Identity Provider Single Sign-On URL and Identity Provider Issuer and
download the certificate.
26/75
Result: The application is assigned to the group.
Assigning App to the Users
1. Go to Applications tab, Select the application, and navigate to the Assignments tab.
2. Select Assign, then ClickAssign to People.
3. Choose the users to assign, then click Assign and Done.
Repeat the above procedure to integrate other CoLOS applications with Iden-
tity platform.
27/75
Integrating an Identity Platform with CoLOS:
Configure SAML certificates with applications:
1. To import the certificate
l Go to System Properties Certificate Management. Select Import next to
CoLOS Administrator SAML.
l Click the three-dot menu next to Certificate file and choose all files. Select the file
and Click Open. Click Apply.
2. Go to Search bar and type Services. Search for Markem-imaje Connectivity, right click
and Select Restart.
3. Go to Security Level, Select High Security. Choose SAML 2.0 - XML Based
Authentication from the Protocol drop down. Click Configure.
28/75
Select Medium Security if the High Security option is not available to
you.
Repeat same steps for other applications and select the respective OKTA
certs for apps.
Leave this blank if the group name does not have a prefix.
29/75
3. Click Test, enter your credentials, Click Sign on.
4. Restart the CoLOS application, then log in using your OKTA credentials.
Click CoLOS User Login to login with your CoLOS login credentials.
30/75
3. Click Create App Integration.
5. On theGeneral settings page enter the app name, e.g., "CoLOS Data Management
(SAML)".
31/75
6. In the Configure SAML Page, In SAML settings,
o The Signle Sign-on URL - https://Server-
name:9340/UserAuthApi/SamlLoginResponse
32/75
istrator, then the group prefix is OKTA-CoLOS_)
8. Select the radio button " It's required to contact the vendor to enable SAML", then Click
Finish.
33/75
Result: The app is created.
9. Go to the specifc application, navigate to the Sign On tab and click View SAML setup
instructions to download the certificate.
10. Note the Identity Provider Single Sign-On URL and Identity Provider Issuer and
download the certificate.
34/75
Assigning CoLOS Data Management App to Groups
1. Go to Applications, Select the application, and navigate to the Assignments tab.
2. Select Assign, then click Assign to Groups.
3. Select the group from the list and click Assign and Done.
35/75
Assigning CoLOS Data Management App to the Users
1. Goto Applications, Select the App, navigate to the Assignments tab.
2. Select Assign and ClickAssign to People.
3. Choose the users to assign, then click Assign and Done.
2. Go to Search bar and type Services. Search for Markem-imaje Connectivity, right click
and Select Restart.
36/75
3. Go to Security Level, Select High Security. Choose SAML 2.0 - XML Based
Authentication from the Protocol drop down. Click Configure.
37/75
l Group Prefix: OKTA-COLOS_
Leave this blank if the group name does not have a prefix.
38/75
Authentication needs to be successful in Test Information
4. Restart the CoLOS application, then log in using your OKTA credentials.
Click CoLOS User Login to login with your CoLOS login credentials.
5. On theGeneral settings page, enter the app name e.g., "CoLOS Data Management
(SAML)".
39/75
6. In Configure SAML Page, In SAML settings,
o The Signle Sign-on URL - https://Server-
name:9340/UserAuthApi/SamlLoginResponse
40/75
istrator, then the group prefix is OKTA-CoLOS_)
8. Select the radio button " It's required to contact the vendor to enable SAML", then Click
Finish
41/75
Result: The app is created.
9. Go to the specifc application, navigate to the Sign On tab and click View SAML setup
instructions to download the certificate.
10. Note the Identity Provider Single Sign-On URL and Identity Provider Issuer and
download the certificate.
42/75
Assigning CoLOS Data Management App to the Groups
1. Go to Applications tab, Select the application, then navigate to the Assignments tab.
2. Select Assign and Click Assign to Groups.
3. Select the Group from the list and Click Assignand Done.
43/75
Assigning CoLOS Data Management App to the Users
1. Go to Applications tab, Select the application, then navigate to the Assignments tab.
2. Select Assign and Click Assign to People.
3. Choose the users to assign, then click Assign and Done.
2. Go to Search bar and type Services. Search for Markem-imaje Connectivity, right click
and Select Restart.
44/75
3. Go to Security Level, Select High Security. Choose SAML 2.0 - XML Based
Authentication from the Protocol drop down. Click Configure.
Repeat same steps for other applications and select the respective OKTA
certs for apps.
45/75
l Audience URL: http://www.provider.com/Audience
46/75
Authentication needs to be successful in Test Information
4. Restart the CoLOS application, then log in using your OKTA credentials.
Click CoLOS User Login to login with your CoLOS login credentials.
47/75
5. On theGeneral settings page enter the app name, e.g., "CoLOS PUI (SAML)".
48/75
7. In Group Attribute Statements (optional):
n Name: Groups
49/75
8. Select the radio button " It's required to contact the vendor to enable SAML", then click
Finish
9. Go to specifc application, navigate to Sign On tab. Click View SAML setup instruc-
tions to download the certificate.
10. Note the Identity Provider Single Sign-On URL and Identity Provider Issuer and
download the certificate.
50/75
Assigning CoLOS PUI App to the Groups
1. Goto Applications, Select the App, navigate to the Assignments tab.
2. Select Assign and Click Assign to Groups.
3. Select the Group from the list and Click Assign and Done.
51/75
Assigning CoLOS PUI App to the Users
1. Goto Applications, Select the App, navigate to the Assignments tab.
2. Select Assign and Click Assign to People.
3. Choose the users to assign, then click Assign and Done.
2. Go to Search bar and type Services. Search for Markem-imaje Connectivity, right click
and Select Restart.
52/75
3. Go to Security Level, Select High Security. Choose SAML 2.0 - XML Based
Authentication from the Protocol drop down. Click Configure.
53/75
l Group Prefix: OKTA-COLOS_
4. Restart the CoLOS application, then log in using your OKTA credentials.
Click CoLOS User Login to login with your CoLOS login credentials.
54/75
Adding CoLOS OEE Application in OKTA
1. Log in to the OKTA portal using an account with administrative rights (https://okta-
devok12.okta.com/).
2. Go to the Applications tab.
3. Click Create App Integration.
5. In General settings page, enter the app name, e.g., "CoLOS PUI (SAML)".
55/75
6. In Configure SAML Page, In SAML settings,
o The Signle Sign on URL - https://Server-
name:9340/UserAuthApi/SamlLoginResponse
56/75
The Group prefix is the prefix of CoLOS groups created in the
identity platform (e.g., If the group name is OKTA-COLOS_Admin-
istrator, then the group prefix is OKTA-CoLOS_)
8. Select the radio button " It's required to contact the vendor to enable SAML", then click
Finish.
57/75
Result: The app is created.
9. Go to specifc application, navigate to Sign On tab. Click View SAML setup instruc-
tions to download the certificate.
10. Note the Identity Provider Single Sign-On URL and Identity Provider Issuer and
download the certificate.
58/75
Assigning CoLOS PUI App to the Groups
1. Go to Applications tab, Select the application, and navigate to the Assignments tab.
2. Select Assign and Click Assign to Groups.
3. Select the Group from the list and Click Assign and Done.
59/75
Assigning CoLOS PUI App to the Users
1. Go to Applications tab, Select the application, and navigate to the Assignments tab.
2. Select Assign and Click Assign to People.
3. Choose the users to assign, then click Assign and Done.
2. Go to Search bar and type Services. Search for Markem-imaje Connectivity, right click
and Select Restart.
60/75
3. Go to Security Level, Select High Security. Choose SAML 2.0 - XML Based
Authentication from the Protocol drop down. Click Configure.
Repeat same steps for other applications and select the respective OKTA
certs for apps.
61/75
l Audience URL: http://www.provider.com/Audience
62/75
Authentication needs to be successful in Test Information
4. Restart the CoLOS application, then log in using your OKTA credentials.
Click CoLOS User Login to login with your CoLOS login credentials.
63/75
5. On the General settings page, enter the app name, e.g., "CoLOS CAT
64/75
7. In Group Attribute Statements (optional):
n Name: Groups
n Filter: Start with
n Group Prefix: OKTA-COLOS_
65/75
8. Select the radio button " It's required to contact the vendor to enable SAML". Click Fin-
ish.
9. Go to specifc application, navigate to Sign On tab. Click View SAML setup instruc-
tions to download the certificate.
66/75
10. Note the Identity Provider Single Sign-On URL and Identity Provider Issuer and
download the certificate.
67/75
Assigning CoLOS PUI App to Groups
1. Go to Applications, Select the application, navigate to the Assignments tab.
2. Select Assign and Click Assign to Groups.
3. Select the group from the list and Click Assign and Click Done.
68/75
Integrating an Identity Platform with CoLOS:
Configure SAML certificates with applications:
1. Open SQL and add the following details in scUser table.
Refer to the following figure.
o scName - username
o scRole - groupname
o scStation - Profiles created in Toolkit
2. Open Toolkit, navigate to Configuration Security and then change the Security
Mode: to User Log On . Click the check box to enable User Defines Station, and Use
authentication modes configured in CoLOS Enterproise other than LDAP .
3. To add a role , Click and enter the Role Name same as OKTA groupname. Click
Save and deploy the project.
69/75
l Click the three-dot menu next to Certificate file and choose all files. Select the file
and Click Open. Click Apply.
6. Go to Search bar and type Services. Search for Markem-imaje Connectivity, right click
and Select Restart.
70/75
7. Go to Security Level, Select High Security. Choose SAML 2.0 - XML Based
Authentication from the Protocol drop down. Click Configure.
71/75
l Group Prefix: OKTA-COLOS_
72/75
Authentication needs to be successful in Test Information
4. Restart the CoLOS application, then log in using your OKTA credentials.
Click CoLOS User Login to login with your CoLOS login credentials.
The below section explains the standard procedures for logging into applications via OKTA
tiles, as well as the methods to launch applications with specific parameters.
2. Click the End User Dashboard button at the top- right corner of the page .
Result: The OKTA End User Dashboard opens, displaying all active apps configured
with OKTA for your account.
4. A new browser tab will open, prompting you to click the Open button.
73/75
Result: The CoLOS Administrator application will be invoked, and you can begin using
the app.
To launch any other web application, such as PUI, follow these steps:
5. Click the appropriate app tile (e.g., PUI) from the OKTA End User Dashboard.
Result: The application will open in a new browser tab without requiring additional cre-
dentials.
The roles and permissions assigned within each application will be the
same as the roles configured for the logged-in user in OKTA.
.
2. In the Search bar, type Bookmark, then click Bookmark button that apperas in the
search results.
74/75
3. Add the required URL and app name. For example
o (https://Servername:8084/?Language=XLanguage)
o App name= CAT_XLanguage
Click Add bookmark.
Result: A new shortcut will appear as an OKTA tile in your dashboard. Clicking this tile
will launch the application with the parameters specified in the URL.
This document outlines the step-by-step process for integrating CoLOS applications with
OKTA using SAML 2.0, ensuring proper configuration and assignment of certificates, groups,
and users and standard procedures for logging into applications via OKTA tiles, as well as the
methods to launch applications with specific parameters
75/75