Setting up SSO(with Okta)

This guide walks you through setting up Single Sign-On (SSO) with Okta for seamless access to DriveHub. It outlines the required configurations in both Okta and DriveWealth for a secure, integrated login experience.

Create SSO App in Okta

  1. Create a new application by clicking ‘New App Integration’ button, then selecting ‘OIDC - OpenID Connect’ then select ‘Web Application’ for application type. Select Next to move forward.
  2. Fill in the details for the application.
    • Enter a name for the application.
    • Add sign in redirect URI.
    • Skip group assignments if you want to do it later.
  3. Share the ClientID, Client Secret and tenant URL securely with DriveWealth.
  4. Update the group mapping on the Sign-On tab. (Recommend this be set to ‘Starts With’ and ‘DriveHub’)

❗️

Using the wildcard “*” and having a user with over 100 groups can break the authentication which is why its recommended to narrow what groups are sent.
Refer: Okta Help Center

Create Bookmark App

  1. In Okta, go to the Browse App Integration Catalog and search for Bookmark.
  2. Click on Bookmark App and Add Integration.
  3. Enter a name such as DriveHub
  4. Enter the URL for DriveHub.
  5. Click done and assign users.

Create SCIM App in Okta

  1. In Okta create a new custom application.

  2. Select Secure Web Authentication (SWA).

    • Enter a name for the application.
    • Enter the login page URL, this URL is not used and doesn’t matter but has to have a URL. You can enter https://www.auth0.com.
    • Check the box to hide the application from users.
    • Check the box under app type to mark that this is an internal application.
    • Click finish
  3. On the general tab, change provisioning from ‘None’ to ‘SCIM’ then save.

  4. Click the Provisioning tab.

    • Enter the SCIM connector base URL that was shared.
    • Enter userName for the unique identifier field for users.
    • For supported provisioning actions, select ‘Push New Users’ and ‘Push Profile Updates’.
    • For Authentication Mode, change it to HTTP Header.
    • For the Bearer token, enter the token that was shared.
    • Click ‘Test Connector Configuration’ to verify the connection works.
    • Then click Save.
  1. Click on the To App tab.
    • Check enable for ‘Create Users’, Update User Attributes' and ‘Deactivate Users’.
  1. From here you can add groups and assign users and they will sync with Auth0.

Creating The Role Sync

❗You will repeat this process for each role. Update display and variable names as appropriate.

  1. Navigate to Directory then Profile Editor and select “User (default)” or another user type if you chose.
  2. Click on “Custom” then click “+ Add Attribute”.
  1. Set the attribute to the following settings:
    • Data type: boolean
    • Display name: DriveHub Role - (Can be anything you want/need, just recommend)
    • Variable name: dh (Can be anything you want/need, just recommend)
    • Description: DriveHub Role (Can be anything you want/need, just recommend)
    • User permission: Hide
    • Click “Save Attribute”
    • Click Profile Editor and search for the SCIM application.
    • Click on “Custom” then click “+ Add Attribute”.

  1. Set the attribute to the following settings:
    • Data type: string
    • Display Name: Role
    • Variable name: Role
    • External name: roles.^[type=='role'].value
    • External namespace: urn:ietf:params:scim:schemas:core:2.0:User
    • Description: DriveHub Role
    • Attribute type: Personal
    • Click “Save Attribute”
  2. Click “Mappings” then click the user type you want to modify.
  3. Click Okta User to “name of your application”.
  1. Scroll to bottom and add the following to each role you want to map over.
    (user. == true) ? ‘’ :''

Once your Okta SSO configuration is complete, users will be able to access DriveHub using their Okta credentials. If you have any questions or run into issues, please reach out to your DriveWealth Contact for support.

📘

Okta Reference Materials

Auth0 Okta Workforce Reference: Connect Your Auth0 Application with Okta Workforce Enterprise Connection

Auth0 SCIM Reference: Inbound SCIM for Okta Workforce Connections

Okta Role Sync Reference: Okta Help Center (Lightning)