Identity Providers Flashcards
What are the benefits of adding a social IdP?
Adding a Social Identity Provider in Okta allows your end users to self-register with your custom applications by first authenticating through their existing social identity accounts such as Facebook, Google, Microsoft, or LinkedIn.
For new users of your custom app, you can configure Okta to create a Just In Time (JIT) Okta user profile based on attributes stored in your end users’ social profiles.
You can use Social IdPs like Facebook and Google as target IdPs within IdP Discovery Routing Rules. For more information about IdP Discovery, see Identity Provider Discovery.
To add a social identity provider, click Add Identity Provider, and then select a social IdP. Detailed information is available on the Social Authentication article on the Okta Developer Site.
What are key benefits of Social AuthN
- No need to build and maintain your own user database, engineer a sign-on and authentication infrastructure, or manage usernames and passwords.
- Ensure quick and easy self-registration to your custom applications.
- Okta profiles are updated automatically when your users update their social profiles.
- Users do not need to remember an additional password.
Configure inbound SAML (using Okta as a SP)
In addition to using Okta as an identity provider (IdP), you can also configure Okta as a service provider (SP). When Okta is used as a service provider it integrates with an identity provider outside of Okta using SAML. Inbound SAML allows users from external identity providers to SSO into Okta.
The System Log provides information about the Inbound SAML events that occur in the system. This information can be useful for debugging your configuration.
What are the benefits of inbound SAML
Inbound SAML allows you to set up the following scenarios.
- Your users can SSO into apps without needing an Okta password.
- You do not need to set up an Active Directory (AD) agent.
- You can connect to a partner.
- You can federate with another IdP.
What are some of the customization options
Customization Options
When you connect your users to Okta with Inbound SAML, there are several customization options.
- Your users can SSO into Okta with no additional provisioning; that is, the users are mastered in Okta.
- Your users can be provisioned into Okta with Just In Time (JIT) provisioning that is managed by an IdP.
- Your users can be assigned to groups with JIT.
- You can enable or disable automatic account linking between SAML identity providers and Okta. You could also restrict automatic account linking based on whether the Okta user is a member of any specified groups.
What are the capabilities
- Because Inbound SAML is built on Universal Directory (UD), you can store rich attributes in Okta from incoming assertions.
- Define any number of identity providers and define an unlimited number of attributes for each provider using the Profile Editor. You are not limited to just the first name, last name, email, and phone attributes
- Control over JIT provisioning. A per-IdP toggle allows you to enable/disable JIT provisioning on a per-IdP trust basis.
- Username filtering to enhance security. You can specify an analyzing username suffix that must be matched.
- Support for encrypted assertions.
- Support for both a shared ACS URL or a trust-specific ACS URL.
- Support for configurable signature algorithm requirements and configurable clock skew.
What are some of the supported Algorithms
Supported Algorithms
The following algorithms are supported for inbound SAML.
Encryption
Inbound SAML transparently supports encrypted SAML assertions. The IdP can encrypt using the public certificate from Okta and any of the following XML encryption algorithms.
http: //www.w3.org/2001/04/xmlenc#aes128-cbc
http: //www.w3.org/2001/04/xmlenc#aes192-cbc
http: //www.w3.org/2001/04/xmlenc#aes256-cbc
http: //www.w3.org/2001/04/xmlenc#tripledes-cbc
Digest
http: //www.w3.org/2000/09/xmldsig#sha1
http: //www.w3.org/2001/04/xmlenc#sha256
Signature
http: //www.w3.org/2000/09/xmldsig#rsa-sha1
http: //www.w3.org/2001/04/xmldsig-more#rsa-sha256
Canonicalization
http://www.w3.org/2001/10/xml-exc-c14n#
Transform
http: //www.w3.org/2000/09/xmldsig#enveloped-signature
http: //www.w3.org/2001/10/xml-exc-c14n#
What is PIV
A personal identity verification (PIV) card is a United States federal smart card that contains the necessary data for the cardholder to be granted to federal facilities and information systems and assure appropriate levels of security for all applicable federal applications. PIV cards are very strong authenticators (up to IAL3/AAL3, per NIST guidance), which can replace the username and password as an authentication method where supported.
What are the steps to set up PIV