Okta

Humio allows for the integration of many applications. If you want to integrate Okta into Humio, you can do so by creating an application (i.e., an app) in Okta. To do this, you'll have to use Okta's system, in particular the SAML (Security Assertion Markup Language) section. This is used to authenticate and authorize the app.
Creating an App in Okta
From the main page of the Okta user interface:
Click on Admin. This will bring you to the Admin Dashboard. From there, go to applications by clicking the button labeled in the header.
Next, click on the button labeled, Figure 220, “Creating an App in Okta”. Incidentally, you can click on any image on this page to enlarge it. Now, choose Web as the platform to use and select SAML 2.0 for the sign-on method. Then click, .
. Then click on the button labeled, . You'll see a box similar to the one inFigure 220. Creating an App in Okta
You'll now be asked to give your application a name. Name it
Humio
.You can also upload an image for the login button. You can use our logo for this purpose. When you're finished, click to continue.You should be on the SAML Settings configuration section. In the General area, you will need to set a few values to tell Okta how to connect to Humio. The table below lists all of the fields you'll need to set, and the values to give them:
Figure 221. Create New App
Field Value Single Sign on URL http(s)://$YOUR_LOGSCALE_URL/api/v1/saml/acs
Audience URI (SP Entity ID) http(s)://$YOUR_LOGSCALE_URL/api/v1/saml/metadata
Name ID Format EmailAddress
Application Username Email
To understand better where these values are entered, you can see an example in the screenshot shown in Figure 221, “Create New App”.
Next, you'll have to add a single attribute in the Group Attribute Statements area of the SAML settings configuration. Set its Name to a value of
group
, with the Name format set toBasic
. Set the Filter toMatches regex
with the value as*
When you're finished doing all of that, click .Figure 222. Group Attribute Statements
For the Feedback step, choose I'm an Okta customer adding an internal app — assuming you are one. Check the box where it says, This is an internal app that we have created. When you've done this, click the button labeled, .
On the next page, you should see a detailed view of the application you just created. On that page, click Identity Provider Single Sign-On URL; the Identity Provider Issuer; and the X.509 Certificate. You can see all of this in Figure 223, “Configuring Humio”. Leave that page open for reference for when you're configuring Humio in a moment.
. This will provide you with three key pieces of information you'll need to configure Humio to work with Okta: theFigure 223. Configuring Humio
At this point, Okta is configured to work with Humio. However, there is a little more to do, but mostly on your Humio system.
Configuring Humio for Okta
After you've done what needs to be done to prepare Okta for integrating with Humio, you'll need to configure Humio. What you'll do will depend on whether you're using Humio Cloud or are self-hosting Humio on your own server.
To configure a Humio Cloud account for integration with Okta, read the Identity Providers documentation page. For a self-hosted installation of Humio, go to the top of this page on Configuring Humio.
When you've finish preparing Humio, go to the Sign On tab in Okta. In the Settings section, click on . This will provide you an input box labeled, Default Relay State. Paste the Integration URL for Humio into that field and save when done.
You'll need to give users in Okta permissions to use the app. Assign the application to any users or groups you want to have access to Humio. See Okta's instructions on how to do this. Otherwise, if everything went according to the instructions on this page, you're now ready to use Okta with Humio.