In Okta, open the Dagster Cloud application and navigate to its Sign On Settings.
Scroll down to the Advanced Sign-on settings section.
In the Organization field, enter your Dagster+ organization name. This is used to route the SAML response to the correct Dagster+ subdomain.
In the following example, the organization name is hooli and our Dagster+ domain is https://hooli.dagster.cloud. To configure this correctly, we'd enter hooli into the Organization field:
Next, you'll save and upload the application's SAML metadata to Dagster+. This will enable single sign-on.
In the Sign On Settings, navigate to the SAML Signing Certificates section.
Click the Actions button of the Active certificate.
Click View IdP metadata:
This will open a new page in your browser with the IdP metadata in XML format.
Right-click on the page and use Save As or Save Page As:
In Chrome and Edge, the file will be downloaded as an XML file. In Firefox, choose Save Page As > Save as type, then select All files. Note: Copying and pasting the metadata can cause formatting issues that will prevent successful setup. Saving the page directly from the browser will avoid this.
After you've downloaded the metadata file, upload it to Dagster+ using the dagster-cloud CLI:
Next, you'll assign users to the Dagster+ application in Okta. This will allow them to log in using their Okta credentials when the single sign-on flow is initiated.
In the Dagster+ application, navigate to Assignments.
Click Assign > Assign to People.
For each user you want to have access to Dagster+, click Assign then Save and Go Back.