Okta is one of the available IDPs to use with Single Sign-On (SSO) in your Hosted~FTP~ account, allowing you to authenticate securely from any device with your SSO credential. This feature is available on our Enterprise T2+ and above accounts. Please note: Hosted~FTP~ currently only supports SSO with OpenID Connect
Required redirect URIs to register in your Okta portal
Server location | Sign-in redirect URI |
Virginia US1 | Https://us1.hostedftp.com/openidconnect |
Virginia US2 | Https://us2.hostedftp.com/openidconnect |
California | Https://us3.hostedftp.com/openidconnect |
Oregon | Https://us4.hostedftp.com/openidconnect |
Ireland | Https://ie1.hostedftp.com/openidconnect |
Frankfurt | Https://de1.hostedftp.com/openidconnect |
Australia | Https://au1.hostedftp.com/openidconnect |
Korea | Https://kr1.hostedftp.com/openidconnect |
Japan | Https://jp1.hostedftp.com/openidconnect |
India | Https://in1.hostedftp.com/openidconnect |
Please refer to Okta’s article here for detailed instructions.
Step | Instructions |
1 | Sign in to Okta organization |
2 | Go to Applications > Applications |
3 | Click “Create App Integration” |
4 | Select “OIDC – OpenID Connect” as the Sign-in method |
5 | Select “Web Application” as the Application type |
6 | Enter App integration name: “HostedFTP Webapp” |
7 | Grant Type: Authorization Code |
8 | Sign-in redirect URLs (Add 2 URIs from the table above) |
9 | Sign-out redirect URLs: empty |
10 | Assignments: Set as desired based on which users or groups need to perform single sign on to the Hosted FTP sites |
11 | Okta API Scopes: None required |
12 | Once the Okta application has been created successfully, you will need to keep the following pieces of information to copy and paste into the Hosted~FTP~ configuration:
|
Once you have followed all of the steps above, you can continue to the Hosted~FTP~ interface as the account admin to setup Okta SSO.
1. Go to your Setup tab and click on the SSO page and click on the Add button
2. Fill out the fields including the information you retained when creating your Okta application and click on Save when completed
Name | The label of the SSO to be recognized when enforcing on an account/group/user level |
Provider | Select Okta |
Domain | The domain used to connect to your Okta server |
Client ID | The client ID found in the provider’s Okta settings |
Client Secret | The client secret in the provider’s Okta settings |
Extra Parameters | Extra parameters to add to the SSO (contact our support team to assist in setup) |
Active | Defaulted to be on active, un-checking this option will turn off the SSO |
Once your SSO is configured, you will need to enable your user logins to use SSO on an entire account, group of users, or individual user level. Please refer to this article on how to enable SSO for user logins.