Configure Onyx with SAML authentication.
Enterprise Edition FeatureContact us to see if Enterprise Edition is right for you.
This guide will walk you through the setup process for Okta. Other identity providers will have a similar process. Please contact us if you need help with a different identity provider.
SAML authentication requires building Onyx images from source!See details in the Docker Compose guide.

Guide

1

Create Okta Application

Navigate to the Okta Admin ConsoleApplicationsCreate App Integration.Okta Create Integration Page
2

Configure Okta Application

Select SAML 2.0.Name your application Onyx and upload the Onyx logo.
If you are white-labeling Onyx, you can freely name your application and upload your own logo.
Add a Sign sign-on URL
https://YOUR_ONYX_DOMAIN.com/auth/saml/callback
Add an Audience URI (SP Entity ID)
https://YOUR_ONYX_DOMAIN.com/metadata
Add an Attribute Statement where Name is email and Value is user.email.Okta Configure SAML Application Page
3

Assign Users to Application

Create the application and navigate to the Assignments tab to assign users.
4

Configure Onyx for SAML

Navigate to onyx/backend/ee/onyx/configs/saml_config and copy the template settings file.
cd onyx/backend/ee/onyx/configs/saml_config
cp template_settings.yaml settings.yaml
Edit the settings.yaml file with the following values:
5

Set Onyx Environment Variables

Set the following environment variables in your .env or values.yaml file (Docker and Kubernetes, respectively).
.env
AUTH_TYPE=saml
If you’re using Docker but don’t have a .env file, copy onyx/deployment/docker_compose/env.prod.template to a new .env file in the same directory.
values.yaml
configMap:
  AUTH_TYPE: saml