<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Integrating AD Users with Okta SSO in Management &amp; Governance</title>
    <link>https://community.qlik.com/t5/Management-Governance/Integrating-AD-Users-with-Okta-SSO/m-p/1620769#M14574</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;We are having similar problem but with reverse item.&lt;/P&gt;&lt;P&gt;QMC and Virtual Proxies are set to use email address. But whenever User logins through okta authentication, account with SAMAccountName (short user ID) are being created. It use to work and only email address use to create, but after upgrading to Qliksense 2019 we started noticing that duplicate account with Short User ID are being created. I checked the configuration and it seems to be fine. Could you tell me if there is anything else I need to check.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;QMC--&amp;gt; Pulls email address and CORP through ODBC SQL tables.&lt;/LI&gt;&lt;LI&gt;Virtual Proxy--&amp;gt; OKTA SAML&lt;UL&gt;&lt;LI&gt;User ID: email&lt;/LI&gt;&lt;LI&gt;User directory : [CORP]&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;But accounts are created as followings&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;useremail@company.com&lt;/LI&gt;&lt;LI&gt;UserID&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Anyway to getrid of 2nd duplicate account i.e UserID account.&lt;/P&gt;&lt;P&gt;More info on another thread I have created below.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.qlik.com/t5/New-to-Qlik-Sense/Duplicate-Users-Issue-Network-Short-Name-and-Email-Address/td-p/1620231" target="_blank"&gt;https://community.qlik.com/t5/New-to-Qlik-Sense/Duplicate-Users-Issue-Network-Short-Name-and-Email-Address/td-p/1620231&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Chandru&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 06 Sep 2019 00:25:54 GMT</pubDate>
    <dc:creator>chandrasjr</dc:creator>
    <dc:date>2019-09-06T00:25:54Z</dc:date>
    <item>
      <title>Integrating AD Users with Okta SSO</title>
      <link>https://community.qlik.com/t5/Management-Governance/Integrating-AD-Users-with-Okta-SSO/m-p/1336115#M9867</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Environment:&amp;nbsp; Qlik Sense Enterprise 3.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We use Okta for single sign-on, and all Okta accounts for internal users are sourced from Active Directory (domain = CORP).&amp;nbsp; The user ID used by most of our SSO-enabled applications is Email Address.&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have created a User Directory Connector for our CORP AD domain with a filter to only synchronize users in the group 'Okta-Qlik-Users'.&amp;nbsp;&amp;nbsp; This is working fine and the accounts created in Qlik have a User ID equal to the Windows logon name (SAMAccountName).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We now want to use Okta SSO with Qlik Sense.&amp;nbsp; I have followed the instructions for creating a virtual proxy to integrate with Okta and have tested it successfully.&amp;nbsp; The problem is that when a user logs into Qlik using Okta SAML it creates another user account using their email address as the User ID and 'OKTA' as the User Directory.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Users - QMC_2017-06-08_09-48-56.png" class="jive-image image-1" src="/legacyfs/online/166212_Users - QMC_2017-06-08_09-48-56.png" style="height: 78px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;Instead of creating a new account we would like to simply map the Okta SAML login to the user's existing AD account.&amp;nbsp; Is there a way to do that?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Michael Mongeau&lt;/P&gt;&lt;P&gt; IT Applications Manager&lt;/P&gt;&lt;P&gt; Stratus Technologies&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Jun 2017 13:55:05 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/Integrating-AD-Users-with-Okta-SSO/m-p/1336115#M9867</guid>
      <dc:creator>Anonymous</dc:creator>
      <dc:date>2017-06-08T13:55:05Z</dc:date>
    </item>
    <item>
      <title>Re: Integrating AD Users with Okta SSO</title>
      <link>https://community.qlik.com/t5/Management-Governance/Integrating-AD-Users-with-Okta-SSO/m-p/1336116#M9868</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Michael,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can achieve the following requirement.&lt;/P&gt;&lt;P&gt;Basic Two Things you need here:&lt;/P&gt;&lt;P&gt;The user ID and user Directory values should be same.&lt;/P&gt;&lt;P&gt;same means:&lt;/P&gt;&lt;P&gt;When you login or pulled users from UDC&lt;/P&gt;&lt;P&gt;and&lt;/P&gt;&lt;P&gt;When you login from OKTA using&lt;/P&gt;&lt;P&gt;If both cases matches then same user is refereed in Qlik Sense Database.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1.SAML attribute for user ID&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;By asking the SSO admin (Here OKTA Guys) to send the required user &lt;SPAN style="font-size: 13.3333px;"&gt;attribute&lt;/SPAN&gt; Value as an attribute in SAML Response.&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;Same attribute you can configure it in Virtual Proxy as SAML attribute for user ID.&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;here:&lt;/P&gt;&lt;P style="font-size: 13.3333px;"&gt;May be SAM-Account-Name is used not sure.(Your proxy configuration and AD attributes will provide the mapping here)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333px;"&gt;2.SAML attribute for user directory:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;By asking the SSO admin (Here OKTA Guys) to send the required User Directory Value as an attribute &lt;SPAN style="font-size: 13.3333px;"&gt;in SAML Response.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Same attribute you can configure it in Virtual Proxy as SAML attribute for user directory.&lt;/P&gt;&lt;P&gt;here:&lt;/P&gt;&lt;P&gt;domain = CORP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is only based on login of the user.&lt;/P&gt;&lt;P&gt;But if you have some some security rules written utilizing the groups info received from UDC pulling data directly from AD.&lt;/P&gt;&lt;P&gt;Then we need to send those groups info also in SAML Response matching the groups info received from UDC.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Suraj&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Jun 2017 06:40:29 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/Integrating-AD-Users-with-Okta-SSO/m-p/1336116#M9868</guid>
      <dc:creator>Suraj_Lal</dc:creator>
      <dc:date>2017-06-13T06:40:29Z</dc:date>
    </item>
    <item>
      <title>Re: Integrating AD Users with Okta SSO</title>
      <link>https://community.qlik.com/t5/Management-Governance/Integrating-AD-Users-with-Okta-SSO/m-p/1336117#M9869</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks so much for the suggestion.&amp;nbsp; Here is how I got it working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the Okta Qlik SAML application:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;on the Sign On tab set the username format to 'AD SAM Account Name'&lt;/LI&gt;&lt;LI&gt;on the General tab added a custom attribute called 'username' and set it to 'appuser.userName'&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the Qlik Virtual Proxy for Okta, in the Authentication section:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;set SAML attribute for User ID = username&lt;/LI&gt;&lt;LI&gt;set SAML attribute for user directory = [CORP]&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I decided to just use a static attribute for the user directory name since I do not expect it to change. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Michael&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Jun 2017 15:46:01 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/Integrating-AD-Users-with-Okta-SSO/m-p/1336117#M9869</guid>
      <dc:creator>Anonymous</dc:creator>
      <dc:date>2017-06-13T15:46:01Z</dc:date>
    </item>
    <item>
      <title>Re: Integrating AD Users with Okta SSO</title>
      <link>https://community.qlik.com/t5/Management-Governance/Integrating-AD-Users-with-Okta-SSO/m-p/1620769#M14574</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;We are having similar problem but with reverse item.&lt;/P&gt;&lt;P&gt;QMC and Virtual Proxies are set to use email address. But whenever User logins through okta authentication, account with SAMAccountName (short user ID) are being created. It use to work and only email address use to create, but after upgrading to Qliksense 2019 we started noticing that duplicate account with Short User ID are being created. I checked the configuration and it seems to be fine. Could you tell me if there is anything else I need to check.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;QMC--&amp;gt; Pulls email address and CORP through ODBC SQL tables.&lt;/LI&gt;&lt;LI&gt;Virtual Proxy--&amp;gt; OKTA SAML&lt;UL&gt;&lt;LI&gt;User ID: email&lt;/LI&gt;&lt;LI&gt;User directory : [CORP]&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;But accounts are created as followings&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;useremail@company.com&lt;/LI&gt;&lt;LI&gt;UserID&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Anyway to getrid of 2nd duplicate account i.e UserID account.&lt;/P&gt;&lt;P&gt;More info on another thread I have created below.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.qlik.com/t5/New-to-Qlik-Sense/Duplicate-Users-Issue-Network-Short-Name-and-Email-Address/td-p/1620231" target="_blank"&gt;https://community.qlik.com/t5/New-to-Qlik-Sense/Duplicate-Users-Issue-Network-Short-Name-and-Email-Address/td-p/1620231&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Chandru&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Sep 2019 00:25:54 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/Integrating-AD-Users-with-Okta-SSO/m-p/1620769#M14574</guid>
      <dc:creator>chandrasjr</dc:creator>
      <dc:date>2019-09-06T00:25:54Z</dc:date>
    </item>
    <item>
      <title>Re: Integrating AD Users with Okta SSO</title>
      <link>https://community.qlik.com/t5/Management-Governance/Integrating-AD-Users-with-Okta-SSO/m-p/1746065#M16709</link>
      <description>&lt;P&gt;Thank you for this.&amp;nbsp; Solved my issue with duplicate accounts.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Sep 2020 14:40:52 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/Integrating-AD-Users-with-Okta-SSO/m-p/1746065#M16709</guid>
      <dc:creator>david_smee</dc:creator>
      <dc:date>2020-09-22T14:40:52Z</dc:date>
    </item>
  </channel>
</rss>

