The company maintains multiple employee identities in Okta, corresponding to multiple Okta users, and hopes to be able to access them to the role role1 under the Volcano Engine account. In this example, there is a user user1 in Okta who wants to be able to configure the role SSO single sign-on, and user1 directly jumps to the Volcano Engine login page from Okta to log in to the Volcano Engine account as role1, and exercises the corresponding permissions of the role.
As an Identity Provider (IdP), Okta needs to sense the service provider Volcano Engine as an "application" to enable single sign-on. To do this, you need to create an application corresponding to the Volcano Engine at Okta.
Next, you need to configure SAML-based single sign-on for your IdP.
AssertionConsumerService element, which is: https://signin.volcengine.com/saml/ssoEntityDescriptor element: https://www.volcengine.com/This step defines the Okta users or user groups in Okta that have access to the VolcineDemo app.
Click on the top navigation of the page Users- Users, click New User in the upper right corner.
After configuring the basic information of user user1, click Save User in the upper right corner.
Click on the left navigation of the user page Applications, click the plus sign on the right, select the VolcineDemo application, click Continue and add.
Return to the Access Control (IAM) console of your Volcano Engine account.
In the Identity Management- Identity Provider - New Identity Provider drawer in Step 1, fill in the Identity Provider name as needed, such as Okta_role. Finally, upload the IdP Metadata metadata file obtained in step 3 and click Submit.
In Access Control, Identity Management - Roles, click New Role, create a new Volcano Engine account, and configure the corresponding permissions.
Select Trusted Identity as: Identity Provider, Identity Provider Type as SAML, and select the Identity Provider Okta_role created in Step 4.
Configure role information: Enter a role name, display name, and description. Please note that this will be displayed in the identity column of the official website as the name of the login identity after single sign-on. It is recommended that you name it according to the actual role name, such as admin, ITservice, etc. This example is represented by a role 1.
Add permissions: You can add an IAM permissions policy to a role and specify the scope of the permissions policy.
Click Submit to complete the creation.
After completing the SSO login configuration, you can verify that you initiated single sign-on from Okta.
After logging in to Okta as user1, go directly to the portal and click VolcineDemo in the My Applications dashboard to test the SSO login for user1. If you successfully jump to the Volcano Engine SSO login page and can log in to account 210****** as the role of Volcano Engine role1, the configuration is successful.
Or you can verify that you initiated single sign-on from Volcano Engine.
In the login page of Volcano Engine, select "Enterprise Federal Login" login method, enter the account ID 210***** and select the corresponding identity provider Okta_role, jump to Okta and log in to Okta's user1 identity. After successful login, if you can jump to the Volcano Engine SSO login page and log in to the role1 identity of the corresponding Volcano Engine account, the single sign-on configuration is successful.