content/operate/rc/security/access-control/saml-sso/saml-integration-okta-org2org.md
This guide shows how to configure Okta as a SAML single sign-on identity provider (IdP) for your Redis Cloud account.
This guide shows how to use the Org2Org application template. You can also use the [Generic]({{< relref "/operate/rc/security/access-control/saml-sso/saml-integration-okta-generic" >}}) application template.
To learn more about Redis Cloud support for SAML, see [SAML single sign-on]({{< relref "/operate/rc/security/access-control/saml-sso" >}}).
Before completing this guide, you must [verify ownership of any domains]({{< relref "/operate/rc/security/access-control/saml-sso#verify-domain" >}}) you want to associate with your SAML setup.
Create an Okta "Org2Org" SAML integration appliction.
Sign in to the Okta admin console.
From the left menu, select Applications.
Select Browse App Catalog.
Locate and select Okta Org2Org.
{{<image filename="images/rc/saml/okta_saml_1.png" alt="Use the Okta admin console to locate the Org2Org application template." >}}
Once you have found the application, click "Add".
{{<image filename="images/rc/saml/okta_saml_2.png" alt="Data transformaiton Pipeline" >}}
Enter this field for the Org2Org application General Settings section and select Next:
Redis Cloud{{<image filename="images/rc/saml/okta_saml_3.png" alt="Use the Okta admin console to locate the Org2Org application template." >}}
Enter the following fields in the Sign-On Options > Attributes section:
redisAccountMappingBasicappuser.redisAccountMapping{{< warning >}}
To ensure the role mapping will not take effect, don't skip entering appuser.redisAccountMapping in the Value field.
{{< /warning >}}
{{<image filename="images/rc/saml/okta_saml_4.png" alt="Use the Okta admin console to locate the Org2Org application template." >}}
Next, select View Setup Instructions. A new browser window opens, providing the information needed to configure the IdP in Redis Cloud.
{{<image filename="images/rc/saml/okta_saml_5.png" alt="Use the Okta admin console to locate the Org2Org application template." >}}
Scroll down to section 6 in the page, and note the following information:
{{<image filename="images/rc/saml/okta_saml_6.png" alt="Use the Okta admin console to locate the Org2Org application template." >}}
Once you capture the information, close the window, return to the Okta admin console, and select Done.
In the left menu, select Directory > Profile Editor, then select Redis Cloud User.
{{<image filename="images/rc/saml/okta_saml_7_customer.png" alt="Use the Okta admin console to locate the Org2Org application template." >}}
Select Add Attribute to add a custom attribute to the user profile and specify the Redis Cloud role.
{{<image filename="images/rc/saml/okta_saml_7_5_customer.png" alt="Use the Okta admin console to locate the Org2Org application template." >}}
Add this information for the new custom attribute:
string arrayredisAccountMappingredisAccountMappingredisAccountMappingYesCombine values across groups{{<image filename="images/rc/saml/okta_saml_app_int_11.png" alt="Use the Okta admin console to locate the Org2Org application template." >}}
Once you add the attribute, it appears in the list of profile attributes.
{{<image filename="images/rc/saml/okta_saml_9.png" alt="Use the Okta admin console to locate the Org2Org application template." >}}
Add a Redis Cloud icon to the application because it's easier for users to identify the application. Select the pencil icon on the application logo and upload a Redis image using these steps:
{{<image filename="images/rc/saml/okta_saml_10_customer.png" alt="Use the Okta admin console to locate the Org2Org application template." >}}
{{<image filename="images/rc/saml/okta_saml_11_customer.png" alt="Use the Okta admin console to locate the Org2Org application template." >}}
Now that our SAML IdP is configured, create an Okta group and assign the Redis Cloud application.
In the left menu, select Directory > Groups, then select Add group.
{{<image filename="images/rc/saml/okta_saml_group_1.png" alt="Use the Okta admin console to locate the Org2Org application template." >}}
Enter Name and Description.
{{<image filename="images/rc/saml/okta_saml_group_2.png" alt="Use the Okta admin console to locate the Org2Org application template." >}}
{{<image filename="images/rc/saml/okta_saml_group_3.png" alt="Use the Okta admin console to locate the Org2Org application template." >}}
Select the group, then select Assign people.
{{<image filename="images/rc/saml/okta_saml_group_4.png" alt="Use the Okta admin console to locate the Org2Org application template." >}}
For each user you want to add to the group, highlight the user in the table and select +. You can also add all users by selecting Add all. After you add all the users to your group, select Save.
{{<image filename="images/rc/saml/okta_saml_group_5.png" alt="Use the Okta admin console to locate the Org2Org application template." >}}
Now that your group is populated with its users, assign the SAML integration application to your group.
From the menu, select Applications > Applications > Redis Cloud. Then, select Assign to groups.
{{<image filename="images/rc/saml/okta_saml_group_6.png" alt="Use the Okta admin console to locate the Org2Org application template." >}}
In the Redis Cloud User Group, select Assign.
{{<image filename="images/rc/saml/okta_saml_group_7.png" alt="Use the Okta admin console to locate the Org2Org application template." >}}
Now, define the Redis account mapping string default for this group and select Save and go back. The key-value pair consists of the lowercase role name (owner, member, manager, billing_admin, or viewer) and your Redis Cloud Account ID found in the [account settings]({{< relref "/operate/rc/accounts/account-settings" >}}). Select "Done".
{{<image filename="images/rc/saml/okta_saml_group_8.png" alt="Use the Okta admin console to locate the Org2Org application template." >}}
The mapping field is now defined as a default for each member of the group.
{{<image filename="images/rc/saml/okta_saml_group_9.png" alt="Use the Okta admin console to locate the Org2Org application template." >}}
To modify the Redis mapping field, select the pencil icon of the Redis Cloud group in the "Redis Cloud" application screen.
{{<image filename="images/rc/saml/okta_saml_group_10.png" alt="Use the Okta admin console to locate the Org2Org application template." >}}
You can modify the mapping field for the whole group on the edit screen that appears.
{{<image filename="images/rc/saml/okta_saml_group_11.png" alt="Use the Okta admin console to locate the Org2Org application template." >}}
To override the Redis mapping field at an individual user level, select the People menu, then select the pencil icon of the person whos field you want to modify.
{{<image filename="images/rc/saml/okta_saml_group_12.png" alt="Use the Okta admin console to locate the Org2Org application template." >}}
Set the user's Assignment master to Administrator to enable group policy overrides. Select Save.
{{<image filename="images/rc/saml/okta_saml_group_13.png" alt="Use the Okta admin console to locate the Org2Org application template." >}}
The user's Type is set to Individual.
{{<image filename="images/rc/saml/okta_saml_group_14.png" alt="Use the Okta admin console to locate the Org2Org application template." >}}
On the screen that appears, select the pencil icon of the user to modify the Redis mapping field.
{{<image filename="images/rc/saml/okta_saml_group_15.png" alt="Use the Okta admin console to locate the Org2Org application template." >}}
{{<image filename="images/rc/saml/okta_saml_group_16.png" alt="Use the Okta admin console to locate the Org2Org application template." >}}
Now that you have a test IdP server and your user group ready, configure support for SAML in Redis Cloud.
Sign in to your account on the Redis Cloud console.
To activate SAML, you must have a local user (or social sign-on user) with the owner role. If you have the correct permissions, the Single Sign-On tab is enabled.
Add the information you saved previously in the setup form (step 1), including:
{{<image filename="images/rc/saml/sm_saml_1.png" alt="Use the Okta admin console to locate the Org2Org application template." >}}
Select Enable and wait a few seconds for the status to change. Then, download the service provider (SP) metadata. Save the file to your local hard disk.
{{<image filename="images/rc/saml/sm_saml_3.png" >}}
Open the file in any text editor. Save the following text from the metadata:
{{<image filename="images/rc/saml/sm_saml_4.png" >}}
{{<image filename="images/rc/saml/sm_saml_5.png" >}}
Return to Okta, select Applications > Redis Cloud > General, then select Edit.
{{<image filename="images/rc/saml/sm_saml_6.png" >}}
Update this information in Advanced Sign-on Settings.
{{<image filename="images/rc/saml/sm_saml_7.png" >}}
Select Save.
To use IdP-initiated SSO with identity providers, set the RelayState parameter to URL https://cloud.redis.io/#/login/?idpId=<ID>.
{{< note >}}
Replace <ID> so it matches the AssertionConsumerService Location URL ID (the content after the last forward slash "/"). To learn more about configuring service provider applications, see your identity provider's documentation.
{{< /note >}}
Return to Redis Cloud console and select Activate.
{{<image filename="images/rc/saml/sm_saml_8.png" >}}
A popup appears, explaining that, to test the SAML connection, you need to log in with Okta credentials of the user defined in the Redis Cloud group. This user is part of the group to which you assigned the Redis Cloud application. Select Continue to go to the Okta login screen.
The Okta login screen appears. Enter the credentials and select Sign In.
{{<image filename="images/rc/saml/sm_saml_10.png" >}}
If everything is configured correctly, you will see the the Redis Cloud console screen. Your local account is now considered a SAML account.
To log in to the Redis Cloud console from now on, click on Sign in with SSO.
{{<image filename="images/rc/button-sign-in-sso.png" width="50px" alt="Sign in with SSO button">}}