Okta SAML Authentication with WatchGuard Access Portal Integration Guide

This document describes how to set up SAML authentication through the WatchGuard Access Portal with Okta as the Identity Provider.

You can configure Single Sign-On to use SAML authentication and enable your users to log in through one portal and get access to multiple services. Once you configured the SAML authentication server in Firebox, you can also use it to integrated with Access Portal, Authentication Portal and Mobile VPN with SSL.

This integration guide describes two solutions for Access Portal SAML authentication based on the Fireware version differences. We recommend that you upgrade to the Fireware v12.11 or higher.

Contents

Integration Summary

The hardware and software used in this guide include:

  • Okta Admin Portal with Super Administrator roles
  • WatchGuard Firebox:
    • Fireware v12.11 or higher
    • Fireware v12.10 or lower
    • Feature key with an Access Portal license

Test Topology

This integration uses Okta Identity Cloud services to communicate with a WatchGuard Firebox over a public Internet connection:

The Screnshot of Topology

Configure the Access Portal for SAML Authentication with Okta

The steps to configure the Access Portal for SAML authentication with Okta are different based on the version of Fireware that you have.

The WatchGuard Access Portal is a subscription service, before you can enable the Access Portal feature and configure it on your Firebox, you must add an Access Portal license to your Firebox feature key.

Test the Integration

After you complete these configuration steps, users in the group you added can sign in to either the Okta account or to a resource configured with Okta SAML Single Sign-On.

To test the integration:

  1. In a web browser, go to the Access Portal URL (https://Host Name or IP address).

Screenshot of Test integration

  1. To log in, click the name of the SAML portal. In this example, click My_Okta.
  2. Complete the authentication process in Okta.
    After successful authentication, the user gets access to the resource.

Screenshot of Test integration 002