Follow this guide to use OpenID Connect with Okta to connect to Mursion
Supported Features
The Mursion and Okta OpenID Connect integration currently support the following features:
- SP-initiated SSO
- IdP-initiated SSO
- JIT (Just In Time) Provisioning
Configuration Steps
Create SSO Configuration in Mursion Portal
- Sign in to Mursion Portal
- Select Settings on the top menu then select the SSO sub-tab.
- Click Create SSO Configuration.
- Please review this note about Claim fields, then, in the New SSO Configuration dialog, enter the following:
- Protocol: Select OAuth 2.0.
- Configuration Name: Enter a descriptive name of your choice.
- Authorization Endpoint: Enter the following URL, replacing ${yourOktaDomain}with your Okta domain - https://${yourOktaDomain}/oauth2/v1/authorize
- Logout Endpoint: Enter the following URL, replacing ${yourOktaDomain}with your Okta domain - https://${yourOktaDomain}/login/signout.
- Client ID: Copy the Client ID of the Okta OpenID Connection application and paste into this field.
- Client Secret: Copy the Client secret of the Okta OpenID Connection application and paste into this field.
- Scope: Leave the default scopes of openid profile email.
- User Info Endpoint: Enter the following URL, replacing ${yourOktaDomain}with your Okta domain - https://${yourOktaDomain}/oauth2/v1/userinfo
- Token Endpoint: Enter the following URL, replacing ${yourOktaDomain}with your Okta domain - https://${yourOktaDomain}/oauth2/v1/token
- Token HTTP Method: Leave POST selected.
- User ID Claim Name: Enter sub.
- Email Claim Name: Enter email.
- First Name Claim Name: Enter given_name.
- Last Name Claim Name: Enter family_name.
- Single Logout Enabled: Check this option to initiate a request to end the Okta user’s session when the user’s Mursion Portal session ends due to explicit logout or session timeout.
- Team Claim Name: Optionally, to externally manage team assignment through a SAML user attribute, specify the name of the attribute that contains the value that should be used to assign users to a Mursion Portal team.
- Team Mapping: If a Team Clain Name is specified, click the Add + button to add a mapping. Select a Mursion Portal team from the Team dropdown. Enter the value of the attribute that should be mapped to the Portal team. To remove a mapping, click the x on the right of the mapping.
- Click Create SSO Configuration.
- Click the newly created SSO Configuration.
- On the Edit SSO Configuration dialog, copy the SSO Configuration’s ID by selecting the ID field value and copying it. Save the ID to be entered in Okta in a subsequent step.
Add Mursion App Integration in Okta
- In Okta, browse the App Integration Catalog and search for Mursion.
- Click the Add button on the Mursion application details page.
- Click the Next button on the General Settings step.
- In the Sign-On Options section, select OpenID Connect.
- In the Advanced Sign-on Settings section:
- Environment: Leave Production selected
- Note: The Mursion OIDC app integration can only be configured for the Production environment.
- SSO Configuration ID: Enter or paste the SSO Configuration ID that was copied from Mursion Portal.
- Environment: Leave Production selected
- Click Done
Testing Mursion Portal SSO
- Assign one or more test users to the Mursion application in Azure AD.
- As one of the test users, click on the Mursion application to initiate SSO.
- If the configuration is correct, the user will be signed in to Mursion Portal and taken through the following flow:
- the Mursion & User agreement will be displayed for the user to accept
- the user profile will be displayed for the user to confirm their profile and timezone
- the Calendar page will be displayed