Ask AI

Setting up Okta SSO for Dagster+#

This guide is applicable to Dagster+.

In this guide, you'll configure Okta to use single sign-on (SSO) with your Dagster+ organization.


Prerequisites#

To complete the steps in this guide, you'll need:


Step 1: Add the Dagster+ app in Okta#

  1. Sign in to your Okta Admin Dashboard.

  2. Using the sidebar, click Applications > Applications.

  3. On the Applications page, click Browse App Catalog.

  4. On the Browse App Integration Catalog page, search for Dagster Cloud.

  5. Add and save the application.


Step 2: Configure SSO in Okta#

  1. In Okta, open the Dagster Cloud application and navigate to its Sign On Settings.

  2. Scroll down to the Advanced Sign-on settings section.

  3. In the Organization field, enter your Dagster+ organization name. This is used to route the SAML response to the correct Dagster+ subdomain.

    In the following example, the organization name is hooli and our Dagster+ domain is https://hooli.dagster.cloud. To configure this correctly, we'd enter hooli into the Organization field:

    Okta Subdomain Configuration
  4. When finished, click Done.


Step 3: Upload the SAML metadata to Dagster+#

Next, you'll save and upload the application's SAML metadata to Dagster+. This will enable single sign-on.

  1. In the Sign On Settings, navigate to the SAML Signing Certificates section.

  2. Click the Actions button of the Active certificate.

  3. Click View IdP metadata:

    The View IdP metadata options in the Okta UI

    This will open a new page in your browser with the IdP metadata in XML format.

  4. Right-click on the page and use Save As or Save Page As:

    In Chrome and Edge, the file will be downloaded as an XML file. In Firefox, choose Save Page As > Save as type, then select All files. Note: Copying and pasting the metadata can cause formatting issues that will prevent successful setup. Saving the page directly from the browser will avoid this.

  5. After you've downloaded the metadata file, upload it to Dagster+ using the dagster-cloud CLI:

    dagster-cloud organization settings saml upload-identity-provider-metadata <path/to/metadata> \
       --api-token=<user_token> \
       --url https://<organization_name>.dagster.cloud
    

Step 4: Grant access to users#

Next, you'll assign users to the Dagster+ application in Okta. This will allow them to log in using their Okta credentials when the single sign-on flow is initiated.

  1. In the Dagster+ application, navigate to Assignments.
  2. Click Assign > Assign to People.
  3. For each user you want to have access to Dagster+, click Assign then Save and Go Back.

Step 5: Test your SSO configuration#

Lastly, you'll test your SSO configuration:

Testing a service provider-initiated login#

  1. Navigate to your Dagster+ sign in page at https://<organization_name>.dagster.cloud

  2. Click the Sign in with SSO button.

  3. Initiate the login flow and address issues that arise, if any.

If successful, you'll be automatically signed into your Dagster+ organization.