Okta Single Sign-on (SSO) for the Metaverse

Setting up a SAML2 IdP for Hyperspace Metaverse Platform with Okta

Jump to:

Setting up a SAML2 IdP for Hyperspace Metaverse Platform with Okta

Overview

1. Creating the SAML application

2. Configuring the application

2.1 General

2.2 Attribute statements

2.3 Feedback

3. Providing Hyperspace with authentication details


Overview

Okta is an Identity and Access Management (IAM) solution that enables associates from organizations to login to the Hyperspace Metaverse Platform using their existing organization credentials.

Given a simple link to a meeting, event, training or a corporate metaverse users can join frictionlessly through one login. Immersive experiences can now be woven into the flow of work without living in an “application silo”.

1. Creating the SAML application

Make sure you are logged into Okta, then select Applications > Applications in the left-hand menu.

In order to create a new App, click on Create App Integration.

In the sign-on method popup that appears, select SAML 2.0, then click Next.

2. Configuring the application

Fill in the App name field, then click Next.

2.1 General

The first section in the configuration is the General section. Some of the information required for these fields must be provided by Hyperspace, if you haven’t received it please reach out to your contact within Hyperspace or write to support.

Fill in the fields as follows:

  • Single sign on URL: provided by Hyperspace, it will be similar to the following:
    https://auth.universalavatars.com/saml2/<YOUR_SSO_ID>/acs
  • Use this for Recipient URL and Destination URL: checked
  • Audience URI: provided by Hyperspace, it will be similar to the following: https://auth.universalavatars.com/saml2/<YOUR_SSO_ID>/metadata
  • NameID format: Persistent
  • Application username: Email

2.2 Attribute statements

Fill the Attribute statements section as follows. Please note the fields are case-sensitive.

Name

Name format

Value

givenName

Basic

user.firstName

sn

Basic

user.lastName

mail

Basic

user.email

After adding the attribute statements, scroll to the bottom and click Next.

2.3 Feedback

The interface will now request some information about the integration, which isn’t required since the app is internal to your organization.

Choose “I’m an Okta customer” for the first question, and check “This is an internal app” for the second. Then click Finish.

3. Providing Hyperspace with authentication details

The last step in setting up the SSO integration is to provide Hyperspace with certain details of your application.

After creating the app, you will be brought back to its details page. Copy the link named Identity Provider metadata and supply it to Hyperspace (either by right-clicking on it and selecting “Copy Link Address”, or by opening it in a new tab and copying the URL).

Once setup has been completed on the Hyperspace side, you will be able to use this method to sign in on UniversalAvatars (and by extension the Hyperspace ecosystem).

Trademarks & Copyrights are property of their respective owners. Pictures are indicative only & may not reflect final production

How useful was this article?

Click on a star to rate it!

We are sorry that this article was not useful for you!

Let us improve this article!

Tell us how we can improve this article?