Skip to main content

Okta Setup

If you use Okta as your SSO, you can use it to control the access to Cloud ex Machina.

Creating the Okta CxM Application

The first step is to create the CxM app in your Okta Portal. Browse to Applications

and create a new SAML 2.0 integration

Name the new application Cloud ex Machina and use the following image as the icon:

To configure the app you will need the following attributes:

  • tenant_id which is a short name that is used to create your URL https://tenant_id.cloudexmachina.io
  • cxm_cognito_pool_id which is an internal identifier for our federated user management.

You can now use the data to set up:

AttributeValue
Single Sign On URLhttps://auth.tenant_id.cloudexmachina.io/saml2/idpresponse
Recipient URLhttps://auth.tenant_id.cloudexmachina.io/saml2/idpresponse
Destination URLhttps://auth.tenant_id.cloudexmachina.io/saml2/idpresponse
Audience URI (SP Entity ID)urn:amazon:cognito:sp:cxm_cognito_pool_id
Default Relay Statehttps://tenant_id.cloudexmachina.io/performance
Name ID FormatUnspecified
ResponseSigned
Assertion SignatureSigned
Signature AlgorithmRSA_SHA256
Digest AlgorithmSHA256
Assertion EncryptionUnencrypted
SAML Single LogoutDisabled
SAML Signed RequestDisabled
authnContextClassRefPasswordProtectedTransport
Honor Force AuthenticationYes
Assertion Inline HookNone (disabled)
SAML Issuer IDhttp://www.okta.com/${org.externalKey}
Maximum app session lifetime

Now configure the following attribute statements:

AttributeName FormatValue
given_nameN/Auser.firstName
last_nameN/Auser.lastName
emailN/Auser.email

You shall then update the Application Username Format from Okta_username to email.

Save the application, and share the Metadata URL with CxM on Slack or email. We will enable the SSO for you as fast as we can.

Keep going and add users and groups to the app to enable your personnel.

On your next login, you should see a button that points you to use your SSO to log in.