Read this before you enable SAML
Enabling SAML will affect all users who use this application, which means that users will not be able to sign in through their regular sign-in page. They will be able to access the app through the Okta service.
Secure Code Warrior doesn't provide a backup sign-in URL where users can sign in using their regular username and password. You can contact Secure Code Warrior Support to turn off SAML, if necessary.
The Okta/Secure Code Warrior SAML integration currently supports the following features:
- SP-initiated SSO
- IdP-initiated SSO
- JIT (Just In Time) Provisioning
- Contact Secure Code Warrior Support (https://help.securecodewarrior.com/hc/en-us/requests/new) and ask them to enable SAML 2.0 for your account.
Include the Metadata URL located on the Sign On tab > Sign on methods > SAML 2.0 > Metadata details with your request.
Secure Code Warrior Support will process your request. After receiving a confirmation email, you can start assigning people to the application.
In Okta, select the Sign On tab for the Secure Code Warrior SAML app, then click Edit:
Configured SAML Attributes: Select the appropriate filter from the Groups drop-down menu, then type the preferred value into the field.
Note: To send all groups a user is assigned to, select Regex and type .* (dot and asterisk).
The following SAML attributes are supported:
Name Value FIRST_NAME user.firstName LAST_NAME user.lastName Groups Configured in the app UI, see step 4 above
Refer to this Secure Code Warrior Knowledge Base article for more details on configuring the Groups attribute.
Enter your email, then click Next.