Okta

Bugcrowd offers a Security Assertion Markup Language (SAML) based Single Sign-On (SSO) integration with Okta to help you create an easy and centralized way to log in to Crowdcontrol. This document provides the steps to configure Okta.

Specific Role Required to Configure SSO: To configure SSO for your program, you must be an Organization Owner. Organization Owners can log in using Username and Password.

Adding Bugcrowd to Your Okta Apps Portal

  1. In Okta, expand Applications on the left panel and click Applications.

    applications

  2. Click Create App Integration

    create-app-integration

    The Create a new app integration window is displayed.

  3. Select SAML 2.0 and click Next.

    select-saml

    The Create SAML Integration page is displayed.

  4. In General Settings, specify the following:

    • App name: Enter Bugcrowd Inc as the app name.
    • App logo: Click Browse and upload the Bugcrowd logo.

    general-settings

  5. Click Next.

    The SAML Settings page is displayed.

    To specify the information for this screen, you must access your Bugcrowd account.

    saml-settings

Accessing SAML Information in Bugcrowd

  1. In Crowdcontrol, under Organization, click on Settings and then Authentication.

    click-authentication

  2. Click Single Sign-on (SSO).

    single-sign-on

    The SSO Configuration for Demo Organization is displayed.

  3. Make a note of the Single sign on URL and SP Entity ID.

    url-id

    Single Logout: Bugcrowd only supports logouts Identity Provider (IdP) initiated logouts, that is logging out of Bugcrowd will not log you out of your SSO provider.

  4. Pause the screen and go to the next step.

Adding SAML Information in Okta

  1. Go back to Okta > Configure SAML page (last step in the first section).

    saml-settings

  2. Specify the following information from your Bugcrowd account (Settings > Authentication > Single Sign-on (SSO))

    • Single sign on URL: Paste the Single Sign on URL from your Bugcrowd account.
    • Audience URI (SP Entity ID): Paste the SP Entity ID from your Bugcrowd account.
    • Name ID format: Select EmailAddress.
    • Application Username: Select Email.

    settings from Bugcrowd

  3. In Attribute Statements section, specify the following:

    • Name: Select Role
    • Value: Select user:Role

    attributes

  4. Click Next.

    The Feedback page is displayed.

  5. Select This is an internal app that we have created and click Finish.

    feedback page

    The Sign-on settings page is displayed. Next, you must map Okta to Crowdcontrol.

    feedback page

Mapping Okta to Crowdcontrol

  1. Click View SAML setup instructions.

    view-setup-instructions

    The How to Configure SAML 2.0 for Bugcrowd Inc. Application screen is displayed.

  2. Make a note of the following information:

    • Identity Provider Single Sign-On URL
    • Identity Provider Issuer
    • X.509 Certificate

    saml-20-for-app

  3. Navigate to the Single Sign-On screen in Crowdcontrol and scroll to the SAML Settings section.

  4. Specify the following information from Okta:

    • IdP Entity ID: Paste the Identity Provider Issuer information from Okta.
    • IdP SSO Target URL and IdP SLO Target URL: Paste the Identity Provider Single Sign-On URL information from Okta.
    • IdP Certificate: Paste the X.509 Certificate information from Okta.

    saml settings in Crowdcontrol

  5. Click Save authentication settings to save the information.

    Domain verification is required for SSO to function properly. For more information, see verifying domain.

Logging in Using SSO

After you have enabled SSO, your team members can log into Okta and click the Bugcrowd app to log in. If SSO is set up properly, members will be logged in to Crowdcontrol.

example-program