Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Panel
panelIconIdatlassian-info
panelIcon:info:
bgColor#FF8F73

This setup might fail without parameter values that are customized for your organization. Please use the Okta Administrator Dashboard to add an application and view the values that are specific for your organization.

When an Identity Provider (IDP) creates unique IDs for users, deleting and recreating a user in the IDP results in a new unique ID for that user. If you add the recreated user back into Avigilon Alta, the system will recognize them as a new user due to the new ID, even though the email address is the same. This can cause confusion, as it becomes unclear which version of the user is correct.

Contents

...

Anchor
supported
supported
Supported Features

The Okta/Avigilon Alta Security SAML integration currently supports the following features:

...

For more information on the listed features, visit the Okta Glossary.

...

Anchor
configuration
configuration
Configuration Steps

On Okta:

1. Go to your Okta instance and install the Avigilon Alta app.

...

4. Log in to the Avigilon Alta Control CenterAccess system.

5. Navigate to App Marketplace, click ‘Get apps’, and select Okta:

...

8. Go back to the Okta integration.

  • Auto-remove users Users from groups: This will Groups:

    • Enabling this feature will automatically remove users from Avigilon Alta groups if they no longer exist in the corresponding Okta groups.

  • Import Users Only import users from groups with an Avigilon Alta group mapping: from Mapped Groups:

    • When enabled, this feature

    prevents users from being imported from the identity provider if they do not
    • ensures that only users who belong to at least one identity provider group mapped to an Avigilon Alta group will be imported. This is

    typically the desired behavior
    • useful when the identity provider contains

    large numbers of
    • many users

    (
    • or non-person system accounts

    ) that will never need
    • that do not require access to Avigilon Alta-managed resources.

  • Map Okta groups to Avigilon Alta groups.

  • Click Save:

...

10. Navigate to Users > Users and check that the users were imported from Okta into Avigilon Alta.

11. Done!

...

Anchor
notes
notes
Notes

The following SAML attributes are supported:

Name

Value

firstName

user.firstName

lastName

user.lastName

email

user.email

login

user.login

id

user.id

SP-initiated SSO

1. Go to: https://control.openpath.com/login/sso

...

How do I log into the Avigilon Alta Open app with Okta SSO?

How do I sync users with Okta?

How do I enable Single Sign-On for Okta?