Okta Integration
Connect IronWifi to Okta to let users authenticate to WiFi using their Okta credentials. This guide covers SAML setup for captive portals and RADIUS integration for WPA-Enterprise networks.
Prerequisites
- Okta administrator account
- IronWifi account with Connector access
- Network connectivity between systems
Setting Up Okta SAML
Step 1: Create Okta Application
- Log into Okta Admin Console
- Navigate to Applications > Applications
- Click Create App Integration
- Select SAML 2.0
- Click Next
Step 2: Configure SAML Settings
General Settings:
- App name: IronWifi
- App logo: (optional)
SAML Settings:
| Field | Value |
|---|---|
| Single sign-on URL | {ACS URL from IronWifi} |
| Audience URI (SP Entity ID) | {Entity ID from IronWifi} |
| Name ID format | EmailAddress |
| Application username |
Step 3: Attribute Statements
Configure attribute mappings:
| Name | Value |
|---|---|
| user.email | |
| firstName | user.firstName |
| lastName | user.lastName |
Step 4: Download Metadata
- Click Sign On tab
- Click Identity Provider metadata
- Save the XML file
Step 5: Configure IronWifi
- Navigate to Connectors > Add Connector
- Select Okta (SAML)
- Upload the metadata file
- Or enter manually:
- IdP SSO URL
- IdP Entity ID
- X.509 Certificate
- Click Save
Step 6: Assign Users
In Okta:
- Go to the IronWifi application
- Click Assignments
- Assign users or groups
Setting Up Okta RADIUS
For WPA-Enterprise authentication via Okta:
Step 1: Enable RADIUS in Okta
- Navigate to Security > Delegated Authentication
- Enable RADIUS configuration
- Note the RADIUS server details
Step 2: Configure IronWifi Connector
- Navigate to Connectors
- Add an Okta connector
- Configure RADIUS forwarding:
- Okta tenant URL
- API token
- RADIUS settings
Testing the Integration
SAML Testing
- Navigate to your Captive Portal URL
- Select Okta login
- Enter Okta credentials
- Verify successful authentication
RADIUS Testing
- Configure a device for WPA-Enterprise
- Enter Okta username/password
- Connect to the network
- Verify successful authentication
User Provisioning
Automatic Sync
Configure automatic user synchronization:
- In IronWifi, edit the Okta connector
- Enable Auto-sync
- Set sync interval
- Configure user filters
- Map attributes
Manual Import
Import users on-demand:
- Navigate to the connector
- Click Sync Now
- Review imported users
Group Mapping
Map Okta groups to IronWifi groups:
- In connector settings, go to Group Mapping
- Add mappings:
- Okta Group → IronWifi Group
- Save configuration
- Run sync
Troubleshooting
SAML Errors
Invalid Signature:
- Verify certificate is correct
- Check certificate hasn't expired
- Ensure metadata is up to date
User Not Found:
- Verify user is assigned to app in Okta
- Check attribute mapping
- Confirm name ID format
Sync Issues
No Users Imported:
- Check API token permissions
- Verify network connectivity
- Review filter settings
Attribute Mismatch:
- Verify attribute statements in Okta
- Check attribute mapping in IronWifi
Best Practices
- Use groups - Manage access via Okta groups
- Regular sync - Keep users current
- Monitor logs - Watch for authentication failures
- Test thoroughly - Verify all authentication flows
- Document - Keep configuration details recorded