Configure Single Sign-On (SSO) for Okta and Splunk On-Call

Enable Splunk On-Call SSO for Okta.

Requirements

This integration is compatible with the full-stack version of Splunk On-Call.

To enable single sign-on (SSO) for your organization, you will need to provide an updated metadata file and your IDP. If you are interested in setting up SSO, contact Splunk On-Call Support.

Configure SSO for Okta

  1. From the Okta user homepage, select Admin to access the Okta Admin dashboard.Splunk On-Call Okta SSO setup step 1

  2. From the Okta Admin Dashboard, Select Applications, then select Applications from the drop-down.Splunk On-Call Okta SSO setup step 2

  3. Within Applications, select Add Application.

  4. The Application label, or name, should auto-populate with the name Splunk On-Call, but you can re-name this label. The Browser plugin auto-submit should be auto-populated as well. Verify that this setting is selected and select Next.Splunk On-Call Okta SSO setup step 4

  5. On the Sign-On Options tab, in the Default Relay State field enter the following URL: https://portal.victorops.com/auth/sso/your-org-slug

  6. Once the URL has been added, select Identity Provider metadata to download the metadata file. Splunk On-Call requires this file to complete the SSO configuration. Email this file to Splunk On-Call Support.

  7. After downloading the file, select Next.

  8. Select the users that should have access to add the Splunk On-Call app to their Okta homepage and log in to Splunk On-Call through SSO. Once all of the users have been listed, select Next.

  9. Select Done.

    Once the users have added the app, they will be directed to a one-time linking process to connect their Splunk On-Call credentials to Okta. To conduct the one-time linking process outside of the Okta Homepage, see First-Time SSO Login.