# Single Sign-On (SSO)

For this guide we will be looking at setting up an **application** and also possibly configuring an **access policy** for the authorization server in Okta. While this guide is using Okta as an example, other OIDC or SAML2 providers, including Azure, can be used as well.

{% hint style="info" %}
SSO is an additional Enterprise feature. Contact Duplicati sales or support if you need SSO enabled for your license or trial
{% endhint %}

### Create a Duplicati application in Okta

1. Sign in to your Okta account.
2. Navigate to the **Admin** page.
3. In the left menu, select **Applications**.

{% hint style="info" %}
Ensure you have an Okta account available with **super admin rights**.
{% endhint %}

<figure><img src="https://2363712449-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F7cMJiGuXy340g9NzpxLY%2Fuploads%2Fgit-blob-5cbc9f4fd443db10a8d77ff4dca518fb0fc179a5%2Fimage11.png?alt=media" alt=""><figcaption></figcaption></figure>

### Choose sign-in method and application type

In the daiglog for creating the application, choose these two options:

* **Sign-in method:** `OIDC - OpenID Connect`
* **Application type:** `Web Application`

Then click **Next**.

<figure><img src="https://2363712449-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F7cMJiGuXy340g9NzpxLY%2Fuploads%2Fgit-blob-31fa59af6daea20304d1946e049e238c54a08ba2%2Fimage9.png?alt=media" alt=""><figcaption></figcaption></figure>

### Configure the Duplicati application in Okta

1. Choose a suitable application name, such as **Duplicati**.
2. Note that **Sign-in redirect URIs** must be provided later — leave it at default for now.
3. Set **controlled access**, preferably limiting access to selected groups for better control.

<figure><img src="https://2363712449-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F7cMJiGuXy340g9NzpxLY%2Fuploads%2Fgit-blob-9247398565e12856be3d168b085059b1482f9079%2Fimage14.png?alt=media" alt=""><figcaption></figcaption></figure>

<figure><img src="https://2363712449-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F7cMJiGuXy340g9NzpxLY%2Fuploads%2Fgit-blob-a3364585abca9490cd41970435b76274ca1fc0dc%2Fimage8.png?alt=media" alt=""><figcaption></figcaption></figure>

### Configure Access Policies for the Duplicati application in Okta

1. Go to **Security → API**.
2. Here you can:
   * Retrieve the **Metadata URI** needed for SSO configuration in Duplicati.
   * Verify existing **access policies**.

If no access policies are present, or you want another one:

1. Click **Add New Access Policy**.
2. Configure it to match your security requirements.

<figure><img src="https://2363712449-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F7cMJiGuXy340g9NzpxLY%2Fuploads%2Fgit-blob-fb68697b3f5b706462bec596689489c62db49e65%2Fimage13.png?alt=media" alt=""><figcaption></figcaption></figure>

***

## Add Okta SSO to Duplicati

1. In the **Duplicati Console**, go to the [**Settings**](https://dev-app.duplicati.com/app/settings) page.
2. Click the **SSO** tab.
3. The **bold SSO name** (example shown as “SSO Demo”) is **case-sensitive** and is required later at login.
4. Click **New SSO Configuration** and choose **Add OIDC**.

{% hint style="info" %}
If the SSO tab is not visible, SSO may not be enabled for your organization; contact Duplicati sales or support.
{% endhint %}

<figure><img src="https://2363712449-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F7cMJiGuXy340g9NzpxLY%2Fuploads%2Fgit-blob-5883763bc2654ab5d5c642f191f56a8df4b96caf%2Fimage4.png?alt=media" alt=""><figcaption></figcaption></figure>

### Configure the OIDC connection in Duplicati Console

To configure OIDC, fill in values from the Okta application.

* **Name:** Used to identify the login method for users. A suggested name is **Okta**.
* **Notes:** Free text, only used in this dialog.
* **Default security group:**\
  New users must be assigned to a group to join the organization.\
  Select the standard **owner** group created with the organization.

{% hint style="info" %}
The default group affects only users who have **not yet logged in** to Duplicati Console. It will **not change** the group(s) of existing users.
{% endhint %}

<div><figure><img src="https://2363712449-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F7cMJiGuXy340g9NzpxLY%2Fuploads%2Fgit-blob-c37e87634307468c2f073fcd0a6eae4df49996b1%2Fimage18.png?alt=media" alt=""><figcaption></figcaption></figure> <figure><img src="https://2363712449-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F7cMJiGuXy340g9NzpxLY%2Fuploads%2Fgit-blob-9feb439f6c47096d6089842eb6b89f305907e3ee%2Fimage2.png?alt=media" alt=""><figcaption></figcaption></figure></div>

### Enter Client ID, Client Secret, and Metadata URI

1. In Okta, open your application page.
2. Copy:
   * **Client Id**
   * **Client secret**
3. Paste both into the Duplicati Console OIDC dialog.

<figure><img src="https://2363712449-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F7cMJiGuXy340g9NzpxLY%2Fuploads%2Fgit-blob-15e55ab46aa50fbc47b0c970d50d1ea4df609a63%2Fimage17.png?alt=media" alt=""><figcaption></figcaption></figure>

#### Metadata URI

1. In Okta, go to **Security → API → Settings**.
2. Copy the **Metadata URI** and paste into the **metadata address** field in Duplicati.

<figure><img src="https://2363712449-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F7cMJiGuXy340g9NzpxLY%2Fuploads%2Fgit-blob-681d7f27ad8f3e96c82f315f0ff66f3c4686d18a%2Fimage16.png?alt=media" alt=""><figcaption></figcaption></figure>

**If Metadata URI is not shown (some Okta plans):**

Use your Okta domain (from the Okta URL or Issuer field) in:

```
https://{yourOktaDomain}/.well-known/openid-configuration
```

### Initial configured OIDC dialog

Your configuration should look similar to the example shown in the guide once the fields are filled.

<figure><img src="https://2363712449-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F7cMJiGuXy340g9NzpxLY%2Fuploads%2Fgit-blob-d5f8a4d860be7251a03629e92488f9ccbb78fccf%2Fimage12.png?alt=media" alt=""><figcaption></figcaption></figure>

## Updating Okta for the connection

When creating the Okta app earlier, the redirect URI was left at default because it wasn’t available yet. Now we will update it.

### Obtain the redirect URI

1. In **Duplicati Console**, open the SSO configuration list.
2. For the relevant SSO configuration, open the action menu.
3. Click the **copy** button to copy the redirect URI.

<figure><img src="https://2363712449-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F7cMJiGuXy340g9NzpxLY%2Fuploads%2Fgit-blob-b8d8523788602710dd9b283d569e222e9cf80729%2Fimage10.png?alt=media" alt=""><figcaption></figcaption></figure>

### Configure redirect URI in Okta

1. In Okta, open your application front page.
2. Scroll to **General Settings**.
3. Click **Edit**.
4. Paste the redirect URI into **Sign-in redirect URIs**.
5. Click **Save**.

<div><figure><img src="https://2363712449-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F7cMJiGuXy340g9NzpxLY%2Fuploads%2Fgit-blob-373f0ecdfea84fc5e77066d6681ff208ccc4b794%2Fimage5.png?alt=media" alt=""><figcaption></figcaption></figure> <figure><img src="https://2363712449-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F7cMJiGuXy340g9NzpxLY%2Fuploads%2Fgit-blob-3822af4300446e061ccfd99a8f27e9caeacd7f46%2Fimage6.png?alt=media" alt=""><figcaption></figcaption></figure></div>

***

## Sign in with Okta SSO

Once configured, you can log in with Okta.

### Add Okta login to your existing account

1. In Duplicati Console, go to [your **Account** page](https://dev-app.duplicati.com/app/settings/account).
2. Click **Add login account**.
3. Choose the new Okta integration.

This allows your current account to be accessed with either login method.

<figure><img src="https://2363712449-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F7cMJiGuXy340g9NzpxLY%2Fuploads%2Fgit-blob-6fc55d8cf7cd3f5b76cad9938d73c804331b12cd%2Fimage1.png?alt=media" alt=""><figcaption></figcaption></figure>

***

### New users logging in with Okta

1. Log out of Duplicati Console.
2. On the login screen, choose **Sign in with SSO**.
3. Enter your organization’s **SSO name** (case-sensitive).
   * The name appears on the SSO configuration page.
   * If not, obtain it from Duplicati Inc.
4. After entering a valid name, you’ll see available login options.
   * Typically there is one option, but multiple can be configured.
5. Click the login button to be redirected to Okta and complete sign-in.

<div><figure><img src="https://2363712449-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F7cMJiGuXy340g9NzpxLY%2Fuploads%2Fgit-blob-6de2dbd244d2f51534a082b92bef3cc1870c52e7%2Fimage15.png?alt=media" alt=""><figcaption></figcaption></figure> <figure><img src="https://2363712449-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F7cMJiGuXy340g9NzpxLY%2Fuploads%2Fgit-blob-aeae1de0ea6b90a8f125181a7be407329cf665b8%2Fimage3.png?alt=media" alt=""><figcaption></figcaption></figure> <figure><img src="https://2363712449-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F7cMJiGuXy340g9NzpxLY%2Fuploads%2Fgit-blob-a6571de2ab6073a7956f837ac11acfd11be40b38%2Fimage7.png?alt=media" alt=""><figcaption></figcaption></figure></div>
