support Contact Support | system status System Status

Securing Experiences Using Okta

In this topic you will learn how to secure experiences using Okta SSO.

When an experience is secured using SSO, users will be required to authenticate before they can access a Web or Mobile App Experience.

The steps in this topic assumed you have signed up for an Okta trial account, signed into your account and can access the Okta Dashboard page.

Creating an application

Start by creating an application.

  1. Login to your Okta trial account.
  2. On the Dashboard page, in the right navigation, click Add Applications.
  3. On the Add Application page, click Create New App.
  4. Select a Platform of Web and a Sign on method of SAML 2.0.
  5. Click Create.
  6. Enter an App name.
  7. (Optional) Browse and select and App logo.
  8. Click Next.
  9. Set the Single sign on URL to https://auth.bcvp0rtal.com/login/callback.
  10. For the Audience URI (SP Entity ID) enter the Okta URL for your Okta homepage. This will be listed on the new account email you received from Okta when your trial account was created.
  11. In the ATTRIBUTES STATEMENTS section, the following attributes should be created:
    Name Value
    firstName user.firstName
    lastName user.lastName
    email user.email

    Mapping the application attributes will cause the following to happen in Brightcove Engage Experiences:

    • For Mobile App Experiences, the user's name and email address will appear on the Profile page
    • For all experiences, the user's email address will appear as part of video analytics
  12. Click the <> Preview the SAML Assertion button. Valid XML should be displayed in a new browser tab. If there are any errors, a message will be displayed.
  13. Click Next.
  14. Select an option for Are you a customer or partner? and then click Finish.
  15. Confirm that the application was created and the Settings page appears.
  16. Locate where it says SAML 2.0 is not configured until you complete the setup instructions. Click View Setup Instructions.

The How to Configure SAML 2.0 instructions will open in a new browser tab. This information will be needed when creating an Access Control Profile in Brightcove Engage.

Creating an Access Control Profile

You need to create an Access Control Profile that will be used to secure any experiences you want to secure using SSO.

  1. Login to your Brightcove Engage account.
  2. Click Settings in the header.
  3. Click Create Profile.
  4. Give the profile a Name.
  5. Return to the How to Configure SAML 2.0 instructions. Copy the Identity Provider Single Sign-On URL and paste it into the SAML 2.0 Endpoint (HTTP) field.
  6. Return to the How to Configure SAML 2.0 instructions. Copy the entire value in the X.509 Certificate field and paste it into the X.509 Certificate field. Make sure you include the BEGIN/END CERTIFICATE lines.
  7. Click Save and confirm that the profile was created.

Assigning group permissions

The final step in Okta is to give all users in Okta access to the Brightcove Engage application.

  1. Return to the Okta Dashboard.
  2. For the Okta application you created, click the Assignments tab.
  3. Click Assign > Assign to Groups.
  4. Click Assign next to the Everyone group and then click Done.

Assign the Access Control Profile to an experience

The last step is to assign the Access Control Profile that was created to the experience(s) you want to secure.

  1. Return to Brightcove Engage.
  2. Edit the experience you want to secure.
  3. In the left navigation, click ACCESS CONTROL.
  4. Select the Access Control Profile that is associated with the Okta SSO configuration.
  5. Click Save.
  6. Publish the experience.

When you access the experience, you should be prompted by Okta to login. The following image is when trying to access a Mobile App Experience.


Page last updated on 23 Apr 2020