Skip to main content

Okta

Configure Voilà for Okta

Create a new Application

Type: SAML 2.0
App Name: Voila

img Create Application

Configure SAML Settings

Audience (Entity ID): https://api.voila.live/sso/saml
Single Sign On URL: https://api.voila.live/sso/saml/init
Recipient URL: https://api.voila.live/sso/saml/consume
Response: Signed
Assertion Signature: Signed
Signature Algorithm: RSA_SHA256
Relay state: None
Logout URL: Disabled
Signature Certificate: Upload this pem file below

sso.voila.live.pem

Application Profile

  • Go to Directory > Profile Editor
  • Edit the Voilà application
  • Create new Application attributes
Okta Application attribute
family_name
given_name
email
sub
sharePersonalData
  • Map the new Application attributes to Okta User attributes
Okta Application attributeOkta User attribute
family_nameuser.lastName
given_nameuser.firstName
emailuser.email
subuser.email
sharePersonalDatatrue (constant, see GDPR related paragraph)

img Token Signing Certificates

Attributes and claims

  • Remove any previous mapping
  • Add the following mapping
Okta Application attributeVoilà attribute
appuser.family_namefamily_name
appuser.given_namegiven_name
appuser.emailemail
appuser.sub (or any field whose value is unique, ex: employeeId)sub
appuser.sharePersonalDatasharePersonalData

img Additional claims and mapping

What about the GDPR ?

Using the SSO feature has impacts on your GDPR compliance. Indeed, harvesting the user’s consent must be done by your organization and prior to your event.

Activating the SSO will prevent the player to display any kind of form at signup