US English (US)
FR French
DE German
PL Polish
SE Swedish
FI Finnish

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

English (US)
US English (US)
FR French
DE German
PL Polish
SE Swedish
FI Finnish
  • Log in
  • Home
  • Identity Governance and Administration (IGA)
  • IGA solution library
  • Instructions & guidelines
  • Configure authentication

Configure: ESA with Okta

Learn how to configure the Efecte Secure Access using Okta

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • Service Management
    Matrix42 Professional Solution Matrix42 Core Solution Enterprise Service Management Matrix42 Intelligence
  • Identity Governance and Administration (IGA)
    IGA overview IGA solution library
  • Platform
    ESM ESS2 ESS Efecte Chat for Service Management Integrations Add-ons
  • Release Notes for M42 Professional, IGA, Conversational AI
    2026.1 2025.3 2025.2 2025.1 2024.2 2024.1 2023.4 2023.3 2023.2 2023.1 2022.4 2022.3 Release Information and Policies
  • Other Material
    Terms & Documentation Guidelines Accessibility Statements
  • Services
+ More
    • Service Management

    • Identity Governance and Administration (IGA)

    • Platform

    • Release Notes for M42 Professional, IGA, Conversational AI

    • Other Material

    • Services

Configure: ESA with Okta

Learn how to configure the Efecte Secure Access using Okta

How to Configure Authentication for Okta (SAML)?

In this article is described instructions for configuring Efecte Secure Access component to be able to authenticate Customers end-users to Efecte solutions (like for example IGA, ITSM etc.), build on top of Efecte Service Management Platform by using Okta. This process involves authenticating users via cookies and SAML.

Note! that The Efecte provisioning engine does not support Okta user retrieval, so they need to be imported into Efecte ESM separately as agreed upon in the project. Authentication does not create these persons, so before configuring, determine how the users will be imported into Efecte.

 

Step-by-Step Instructions

  1. Login with ESA Admin (main.admin) to URL domain.com/auth/admin 
     
  2. Select correct realm from the left top corner

     
  3. Open Identity Provider settings from the left side panel
     

     
  4.  Add new provider by selecting SAML v2.0


     
  5. Import config file (Ask Identity Provider Metadata from the customer)


     
  6. Scroll down and choose Add button (it saves the identity provider)


     
  7. After save copy from the ESA configuration screen an URL listed as Redirect URI and provide this to customer (needed in Okta).

     
  8. After above configuration is done, a new option to login appears on the ESA login page
     
 
 

ESA mappers configuration

After using new button to login to Okta, below screen is visible on the screen, it means, ESA needs further configuration for the mappers.

                    

In order to pass the User from ESA to other systems (ESM, ESS, IGA) - ESA must be aware of context of the User. For that purpose, ESA stores a bit of metadata, describing each User which attempted to login.

Screen above is showing, because ESA is unable to retrieve all of the needed data from Identity Provider (Okta) - and is asking the User to manually input all required data.

We can overcome that, and prepare an automation which will automatically map attributes with data coming from the Okta, to attributes required by ESA User.

  1. Login with ESA Admin (main.admin) to URL domain.com/auth
     
  2. Open Identity Provider settings from the left side panel

     
     
  3. Go to Mappers section. Here is an example of how they should be defined.
  • For email use the mapper type Attribute Importer.
    Map the user attribute email to http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress
     

 

  • For username use the mapper type Username Attribute Importer.
    Map the username attribute username to http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

 

  • For surname use the mapper type Attribute Importer.
    Map the user attribute lastName to http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname

 

  • For given name use the mapper type Attribute Importer. Map the user attribute firstName to http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname


 

Note!

Do notice that ESA, to have full understanding of the User requires FOUR mandatory mappings: username, email, firstname and lastname attributes. 

After these steps:

  • Make sure that a Person datacard is created in ESM.
  • Make sure that Person has right value in servlet.auth.person.uid.attribute.code - it will be used later on, as a login name.

When above steps are completed, during login process, ESM will create missing User object, link it with already existing Person - and proceed to startup page of ITSM for given role.

 
 

SAML Identity provider example

 
 

How to debug ESA SAML messages

There are two options:

  1. Install SAML message decoder to your browser. The SAML decoders are available as browser extensions (e. g. SAML Tracer for Firefox, SAML Chrome Panel for Google Chrome).
     
  2. Set the ESA log to DEBUG level

    1. Inside ESA container, edit this file:
      /etc/containerpilot/jobs/esa/start_primary

      change from this:
      --log-level=INFO

      to this:
      --log-level=DEBUG
       
    2. then, kill java process:
      $ pkill java
       
    3. to revert changes, change back "--log-level" to INFO,  then kill java process ($ pkill java)

      NOTE ! if the ESA container is restarted, all changes will be reverted - in this case, the debug level will be back to INFO)
 
 

Login video

Here is an example video of how to log in. Note that Okta can also be automated (SSO), in which case the ESA login screen is not displayed and the user is redirected directly to Okta. After successful authentication, the user is moved to the Efecte solution for example to portal.

Your browser does not support HTML5 video.
 
 

 

 

 

 

customize: esa using okta set up: esa with okta

Was this article helpful?

Yes
No
Give feedback about this article

Table of Contents

Related Articles

  • Configure: Secure Access (ESA) for ESM role assignment
  • Configure: ESA Google authentication
  • How to Enable ESA Admin events

Copyright 2026 – Matrix42 Professional.

Matrix42 homepage


Knowledge Base Software powered by Helpjuice

0
0
Expand