Create a new Okta App Integration:


Give it a name:

On the Next page, configure it as below:
- The Single Sign On URL needs to point to your Nx Cloud instance URL and ends with
/auth-callback - The Audience should be
nx-private-cloud

- The Single Sign On URL needs to point to your Nx Cloud instance URL and ends with
Under Advanced Settings, make sure both Response and Assertion are set to Signed

Scroll down to attribute statements and configure them as per below:

Click “Next”, and select the first option on the next screen.
Go to the assignments tab and assign the users that can login to the Nx Cloud WebApp:
- Note: This just gives them permission to use the Nx Cloud web app with their own workspace. Users will still need to be invited manually through the web app to your main workspace.

Then in the Sign-On tab scroll down:

Scroll down and from the list of certificates, download the one with the "Active" status:

Extract the downloaded certificate value as a one-line string:
awk 'NF {sub(/\r/, ""); printf "%s\\n",$0;}' okta.cert- We'll use this later
Then view the ldP metadata:

Then find the row similar to the below, and copy the highlighted URL (see screenshot as well):
1.
html <md:SingleSignOnService Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST" Location="https://trial-xxxxx.okta.com/app/trial-xxxxx_nxcloudtest_1/xxxxxxxxx/sso/saml" />
SCIM Provisioning
Section titled “SCIM Provisioning”SCIM (System for Cross-domain Identity Management) provisioning enables automatic user lifecycle management for Nx Cloud through Okta. Once configured, Okta will automatically:
- Provision new users when they're added to designated groups
- Update user permissions when group memberships change
- Deprovision users when they're removed from groups or deactivated
Enable SCIM provisioning
Section titled “Enable SCIM provisioning”Select the SAML application you created in the above setup steps.
- Navigate to General then click Edit
- Check Enable SCIM Provisioning
- Click Save

Configure SCIM
Section titled “Configure SCIM”After SCIM provisioning is enabled, Provisioning tab will become available for the SAML application.
- Navigate to Provisioning then click Edit
- Enter
{NX_CLOUD_APP_URL}/v1/scimfor connector base URLNX_CLOUD_APP_URLis provided by your DPE
- Enter
emailfor unique identifier field - Check Push New Users and Push Profile Updates
- Select HTTP Header for authentication mode
- Enter the JWT token
- JWT token is provided by your DPE
- Click Save

After SCIM provision is configured, To App settings will become available under Provisioning tab
- Navigate to Provisioning
- Click To App then click Edit
- Enable Create Users
- Enable Update User Attributes
- Enable Deactivate Users
- Click Save

Add custom attribute for access specification
Section titled “Add custom attribute for access specification”- Under Directory section, navigate to Profile Editor
- Select your SAML application

- Click Add Attribute

- Select
string arrayfor data type - Enter
Nx Cloud Access Specfor display name - Enter
nxCloudAccessSpecfor variable name- External name will be populated automatically
- Enter
urn:ietf:params:scim:schemas:extension:nxcloud:2.0:Userfor external namespace - Check Enum
- Define enum values
Readwithnxcloud:organization:{organization_id}:readWritewithnxcloud:organization:{organization_id}:writeorganization_idcan be provided by your DPE
- Check Attribute required
- Select Group for attribute type
- Click Save

Provision users
Section titled “Provision users”Select the appropriate nxCloudAccessSpec value when you assign your SAML application to your Groups.

Connect Your Nx Cloud Installation to Your SAML Set Up
Section titled “Connect Your Nx Cloud Installation to Your SAML Set Up”Contact your developer productivity engineer to connect your Nx Cloud instance to the SAML configuration.