Set Up Capella SSO Using Okta
- Capella Operational
- how-to
Configure Single Sign-On (SSO) between Okta and Couchbase Capella to allow your organization’s users to authenticate securely without managing separate credentials. This integration enables streamlined access management while maintaining enterprise-grade security.
Prerequisites
To configure Okta as an IdP, you need:
-
To enable SSO for your Capella organization.
-
An Okta account.
-
To sign in to the Okta Admin Console as a super admin.
Procedure
Choose the tab for your preferred authentication protocol.
-
SAML
-
OIDC
To configure federated and SSO authentication using SAML with Okta as your identity provider (IdP), you must complete three procedures in the following order:
Start by creating an App Integration in Okta. You need information from this step to create a realm in Capella.
-
In the Okta Admin Console, click
. -
Click Create App Integration.
-
For the sign-in method, choose SAML 2.0.
-
Click Next.
-
Configure the options on the General Settings page:
-
App Name: Enter your desired application name.
-
(Optional) App logo: Add the Capella logo.
-
(Optional) App visibility: Adjust if you don’t want to show the Capella app to users in Okta.
-
Click Next.
-
-
Configure the options on the Configure SAML page:
-
Add the following placeholders:
Field Value Single Sign-On URL
Enter a placeholder, such as
https://placeholder
. You’ll provide the real value in a later step.Audience URI (SP Entity ID)
Enter a placeholder, such as
uri:placeholder
. You’ll provide the real value in a later step. -
Click Show Advanced Settings.
Verify that the advanced settings have the following values:
Field Value Response
Signed
Assertion Signature
Signed
Signature Algorithm
RSA-SHA256
Digest Algorithm
SHA256
Assertion Encryption
Unencrypted
-
In the Attribute Statements (optional) section, create the following three attributes:
Values entered into the Name column are case-sensitive. Enter them as shown in the table. Name Name format Value email
Unspecified
user.email
given_name
Unspecified
user.firstName
family_name
Unspecified
user.lastName
-
In the Group Attribute Statements (optional) section, create the following attribute:
Name Name format Filter Filter Value groups
Basic
Matches regex
.*
This filter matches all group names associated with a user. You can filter the
groups
names sent to Capella further by adjusting the Filter and Filter Value. -
Click Next.
-
-
Complete the Feedback page:
-
Add any further feedback if desired.
-
Click Finish.
-
With an Okta integration app created, you need to create a realm in Capella that requires some information from Okta.
-
In the Capella UI, click
. -
Click
. -
Complete the Create Realm page:
-
Copy the following fields from your Okta configuration to Capella:
To find this information in Okta, open the app integration you just created to the Sign On tab. Within the SAML Setup section of this page, click View SAML setup instructions. Okta Field Capella Field X.509 Certificate
SAML Signing Certificate
Identity Provider Single Sign-On URL
Sign-in Endpoint URL
-
Verify that the remaining SAML protocol settings are as follows:
Field Value Signature Algorithm
RSA-SHA256
Digest Algorithm
SHA256
SAML Protocol Binding
HTTP-POST
-
Choose a default team.
Capella automatically assigns users to the chosen default team when they do not match any team based on their SSO groups. All users assigned to the default team have its chosen permission set.
For more information, see Map User Roles.
-
Choose to turn on or off group mapping.
Group mapping allows you to assign roles to SSO users based on which teams map to their SSO group.
If you do not use group mapping, Capella uses the default team to give SSO users their roles when they first sign in. Without group mapping, you must manage your users' organization roles using the People tab and project roles using each project’s Collaborators tab.
-
-
Click Create Realm.
Capella creates the new realm with an auto-generated name.
Users need to know the realm name to sign in with SSO. You can change the a realm name after you create the realm. For more information, see Change the Realm Name.
Now that you have created the realm, you need to configure Okta to replace the placeholder values that you used.
-
In the Okta Console, open the app integration you created to the General tab.
-
Inside the SAML Settings section, click Edit.
-
On the General Settings page, click Next.
-
Edit the options on the Configure SAML page:
-
Copy the following fields from your Capella realm configuration to the Okta configuration:
To find this information for your organization’s Capella realm, first open the page. Listed on this page is the realm that you just created with an auto-generated name. Click the down arrow to show the realm information page.Capella Field Okta Field Callback URL
Single sign on URL
Entity ID
Audience URI (SP Entity ID)
-
-
Click Next.
-
Click Finish.
-
In Okta, assign users to the Capella app integration.
-
With the app integration open, click the Assignments tab.
-
Make sure that all your Capella organization users who use the Okta service are enrolled. For more information, see the Assign an app integration to a user page of the Okta documentation.
-
To configure federated and SSO authentication using OIDC with Okta as your identity provider (IdP), you must complete three procedures in the following order:
Start by creating an App Integration in Okta. You need information from this step to create a realm in Capella.
-
In the Okta Admin Console, click
. -
Click Create App Integration.
-
Choose OIDC - OpenID Connect.
-
Choose Web Application.
-
Click Next.
-
Configure the General Settings:
-
App integration name: Enter a meaningful name.
-
Sign-in redirect URIs: Leave unchanged for now—you’ll add this later.
-
Assignments Select if you’d like to assign this application to all users or only a specified group. Make sure that you enroll all of your Capella organization users who use Okta.
You can choose to skip this and do it at a later time. See the Assign an app integration to a user page of the Okta documentation for more detail.
-
Click Save.
-
With the application created in Okta, you need to create a realm in Capella using its information.
-
In Capella, click
. -
Click
. -
Copy the following information from your Okta application configuration to Capella:
All this information is in the SSO section of the Okta Admin panel when configuring your application. Okta Field Capella Field Use your Okta issuer URL followed by
/.well-known/openid-configuration
.For example:
https://dev-example.okta.com/.well-known/openid-configuration
OpenID Connect Discovery URL
Client ID
Client ID
Client Secret
Client Secret
-
Configure scopes:
Scopes determine which user information Capella requests from your identity provider. The
openid
,email
, andprofile
scopes are automatically included in the realm by default, so you do not need to add them.When adding additional scopes, separate each entry with a space.
-
Configure a default team and group mapping.
-
Choose a default team.
Capella automatically assigns users to the chosen default team when they do not match any team based on their SSO groups. All users assigned to the default team have its chosen permission set.
For more information, see Map User Roles.
-
Choose to turn on or off group mapping.
Group mapping allows you to assign roles to SSO users based on which teams map to their SSO group.
If you do not use group mapping, Capella uses the default team to give SSO users their roles when they first sign in. Without group mapping, you must manage your users' organization roles using the People tab and project roles using each project’s Collaborators tab.
-
-
Click Create Realm.
Capella creates the new realm with an auto-generated name.
Users need to know the realm name to sign in with SSO. You can change the a realm name after you create the realm. For more information, see Change the Realm Name.
Now that you have created the realm, you need to configure Okta to replace the placeholder values that you used.
-
In the Okta Console, open the app integration you created to the General tab.
-
Scroll down to the General Settings section and click Edit.
-
Copy the following fields from your Capella realm configuration to the Okta configuration:
To find this information for your organization’s Capella realm, open the page. Listed on this page is the realm you just created with an auto-generated name. Click its listing to open the realm information page.Capella Field Okta Fields Callback URL
Sign-in redirect URIs
-
Click Save.
-
In Okta, assign users to the Capella app integration if you have not already done so.
-
With the app integration open, click the Assignments tab. See the Assign an app integration to a user page of the Okta documentation for more information.
-