Configuring SSO via the Enhanced Web Interface: Okta
2024-05-31
Version 1.0
Single Sign On allows Users to easily log in to all their applications with the same credentials. Eagle Eye Networks supports the use of SSO applications for the creation of accounts and the management of access. This document will detail how to set this up for Google and Microsoft Users.
Log in to the Enhanced Web Interface.
User must be an Administrator to set up this functionality.
Click Admin.
Select Account Settings.
Click Identity Provider.
From here you can set up any of the SSO integrations you need. This document will cover Google and Microsoft.
Enable Okta as the IDP
Okta: Select this option if you want to configure Okta authentication.
Create an account in Okta if you do not already have one.
Obtain your Eagle Eye account ID.
Open your Okta administrator dashboard and select Applications > Applications from the left navigation menu. Click Create App Integration.
On the Create a New App Integration screen, select OIDC for Sign-in Method and Web Application for Application Type. Click Next.
On the New Web App Integration screen, enter the name for your app integration name and the URL for Sign-in redirect URIs.
To get the redirect URI, call: {baseURL}/api/v3.0/accounts/self/ssoAuthSettings?include=ssoOidcIdpConfigUrls
Example baseURL: api.c013.eagleeyenetworks.com
This call returns the redirectUri for your account.
The Application Integration Information appears on the next screen. The Client ID and Client Secret Information needed for configuring the VMS Cloud are found here.
On the Assignments tab, choose the people who can use this login option for the Cloud VMS.
In order to use IdP-initiated login, make the following configurations on the Application General tab.
In the Initiate Login URI box, enter: https://auth.eagleeyenetworks.com/sso?issuer={registrationId}&target_link_uri={webapp_url}
The registrationId is the last part of the redirectUri retrieved from Get {baseURL}/api/v3.0/accounts/self/ssoAuthSettings?include=ssoOidcIdpConfigUrls
For example, if you get
As a response, your registrationId is 00000011. The redirectionId is actually your Eagle Eye account ID.
Your login URI will be: https://auth.eagleeyenetworks.com/sso?issuer=00000011&target_link_uri=webapp_eagleeyenetworks.com
The Okta settings are shown below:
Update the Client ID and Client Secret with the values from the Okta application created in the prerequisites section. For the Issuer URL, you can use the actual Okta domain https://<your-okta-domain> , (Do not include “/” at the end.)
SP initiated SSO flow
Log in to the application,
1. Provide a non-administrator user account at the identifier first page.
2. Login with Okta and provide consent.
Go to https://<your-okta-domain>/app/UserHome.
Log in with a user who exists in your Eagle Eye Networks account with the same email.
Click on the Application you created to be redirected to the application.
Check the Add New Users if they Do Not Already Exist box in the Identity Provider Integration via Single Sign-on screen in the Cloud VMS interface.
Log into the application. Go to https://<your-okta-domain>/app/UserHome.
Log in with a user who does not exist in your een account with the same email.
Click the Application you created and you will be redirected to the application and auto-provisioned.
If Microsoft is the IdP, use the instructions in this section to enable Azure Active Directory (AD).
If you do not have an account in Azure AD, register for a free account at https://azure.micrsoft.com.
Obtain the redirectUri for the account by adding your account ID at the end of this redirectUri: https://auth.eagleeyenetworks.com/login/oauth2/code/<account ID>.
Log in to the Azure console (https://portal.azure.com/#home) and navigate to Manage Microsoft Entra ID (previously known as Azure ID).
Go to App Registrations in the left panel and create a new registration.
Provide the following information under the Register an Application wizard:
Name the application.
Set the Supported Account Type to Accounts in this Organizational Directory Only.
Use the redirectURI as obtained in Configuring Microsoft Azure OIDC.
On the Application Overview screen, create a client credential using the Add a Certificate or Secret option.
Click New Client Secret.
Enter a description of the secret and an expiration date.
Copy the Value field to a text file and save it.
IMPORTANT: This is the Client Secret and cannot be viewed again.
You can find the Application (Client) ID on this screen as well.
Navigate to the API Permissions on the left panel and select Add a Permission.
Select the Microsoft Graph API.
Add Email and OpenId permissions.
Navigate to Token Configuration from the left panel and click Add Optional Claim.
In the Add Optional Claim wizard, select Adding verified_primary_email is optional.
You can also update the consent page using the Branding & Properties tab in the left panel.
Assign users to the application. Navigate to Home > Manage Microsoft Entra ID > Enterprise Applications and select your application. Go to Assign Users and Groups and assign users as shown below to the application.
Use the instructions in this section to configure the organizational Microsoft SSO.
Update the Client ID (Application (client) ID) and Client Secret with values you got from the Azure AD application created in Prerequisites.
You can find the <tenant-id> on the Overview page.
You should now be able to log in to the application.
Provide a non-administrator user account at the identifier home page.
Log in with Azure AD and provide the consent.
Note: Be sure you have the same user created on the Azure AD side.
Update the homepage URL in the Branding & Properties section of the application as follows:
https://auth.<domain-branding>/sso?issuer=<registration-id>&target_link_uri=<webapp-url>.
domain-branding can be eagleeyenetworks.com, mobotixcloud.com, etc.
The registration-id is your account id. This Can be found at the end of redirectUri found in Prerequisites.
The <webapp-url> can be https://webapp.eagleeyenetworks.com. (Based on the domain branding you can use different values for this and make sure values are URL encoded).
An example is: https://auth.eagleeyenetworks.com/sso?issuer=00032511&target_link_uri=https://webapp.eagleeyenetworks.com
Navigate to the Enterprise Application tab and select your application. In the left panel select Manage > Properties. Set Visible to Users to Yes.
Go to https://myapplications.microsoft.com?tenantId=<tenant-id>.
Log in with a user who exists in your Eagle Eye Networks account with the same email.
Click the Application you created and you will be redirected to the application.
Check the Add New Users if They do not Already Exist box in the Identity Provider Integration via Single Sign-on screen in the Cloud VMS interface and click Save.
Log in to the application. Go to https://myapplications.microsoft.com?tenantId=<tenant-id>.
Log in with a user who exists in your Eagle Eye Networks account.
Click the Application you created to be redirected to the application.
For support please email: support@een.com
or give us a call at: 512-473-0501
US: +1-512-473-0501
EU: 31 (0) 20 26 10 461
ASIA PACIFIC: +81-(3)-6869-5477
#1 In Cloud Media Video Surveillance Worldwide