Configure Okta SSO to authenticate users into the Tanzu CloudHealth platform
NoteTanzu CloudHealth does not support mixed-mode authentication. After you configure SAML SSO through an identity provider (IDP) in the Tanzu CloudHealth platform, you can only invite users through that IDP. You will no longer be able to send user invitations through the Tanzu CloudHealth platform.
Use the information in this section to configure the SAML app you created. For more details about items in the configure SAML settings menu, visit the Okta help.
In these examples, replace the variable <domain-com>
in these examples with the connection name that you are using. For example, if the domain name was mydomain.com
, the corresponding connection name would be mydomain-com
.
https://cloudhealthtech.auth0.com/login/callback?connection=<domain-com>
urn:auth0:cloudhealthtech:<domain-com>
name
Unspecified
user.firstName + " " + user.lastName
email
Unspecified
user.email
roles
Unspecified
Starts With
cloudhealth-
roles
Unspecified
Matches Regex
.*
The Group Attribute Statements will pass all groups in Okta to which a member belongs. If you want to limit the scope of the groups, you can change the Regular Expression value from .*
to a pattern that matches the groups you wish to share with the Tanzu CloudHealth platform.
If the group names start with the same value, you can use the Starts With
filter instead of filtering by prefix defined in the Value
section.
Configure groups that will pass your Tanzu CloudHealth roles via SSO. For instructions on how to create groups, see the Okta help.
Create three Okta groups to map to the default Tanzu CloudHealth roles using exactly the name and spelling below:
cloudhealth-standard
cloudhealth-power
cloudhealth-administrator
Also create Okta groups for any additional custom roles you have configured in Tanzu CloudHealth. To add custom roles, add cloudhealth-
before the IDP role name. You can find the IDP name for a custom role by going to https://apps.cloudhealthtech.com/roles
. For example, for an IDP named tech-support
, the corresponding group name in Okta is cloudhealth-tech-support
.
Get the following SAML credentials from your IDP.
company.com
format. Make sure to enter a space after the domain name.BEGIN CERTIFICATE
and END CERTIFICATE
portions of the Certificate.cloudhealth=
to it.Go to your domain provider, and add the DNS token as a TXT token to the domain. Tanzu CloudHealth uses the TXT token to validate the domain. This process can take up to 72 hours. Validated tokens appear in the Claimed Domains section.
After the domain is validated, all users who are listed in the IDP will have access to the Tanzu CloudHealth platform. Users cannot sign into the Tanzu CloudHealth platform using their existing credentials.
When your SSO configuration uses more than one domain, ensure that the TXT record is present for all the domains before validating. Because once a domain is validated, only users from the Claimed Domains will be able to sign in via SSO.
You can configure the session length for your users in the Tanzu CloudHealth platform. The default session length is Until the browser closes. However, the best practice is to specify a shorter length, which is measured from the time the user was last active, not from the time the user last logged in.