Follow

Okta Integration to Kaseya

  1. Sign into Okta> Admin>Applications

  2. Add Application> search “Kaseya” > Add
    1.png

  3. For “Kaseya Host” enter the domain name that your Kaseya server is on. This will be the domain portion of the URL you would normally go to, to log into your Kaseya Server.
    2.png
  4. Click “Next”
  5. Assign people to the application, Click Next
    3.png

  6. Click Done
  7. Select “Sign On” at the top menu
    4.png

  8. Select “Edit” in the Settings area
    5.png 
  9. Add the “Default Relay State” as “http://[kaseyahost]/vsapres/web20/core/ssologin.aspx”

  10. Click the “View Setup Instructions” button

  11. On the window that opens, scroll down until you see the “x.509 Certificate” area and click the link to download the Certificate in *.cert format.
    6.png

  12. Open the folder where the Certificate downloaded to, and rename the extension from “cert” to “cer”.
    7.png
  13. Close the Window
  14. Click Save.

  15. The default “Credential Details” are configured to use the “Okta Username” which pertains to the Email address. As long as the email address exists in Kaseya as the Username for the user, the Okta integration will function.

     

 

Steps for Kaseya Configuration:

  1. Log into Virtual System Administrator R9.1 - newer
    2fa6.PNG
  2.  Select the AuthAnvil Module > Configure AuthAnvil Settings
    2fa.PNG
  3. Select - I would like to configure Two Factor Auth Only.2favrpws.png
  4. Select Begin.
    Note: See this article if you would like to add both the Logon protection and the Password Server integration.
  5. Next Enter the SAS URL for your AuthAnvil Server.2fa2.PNG
    Note: Your SAS URL will be https://kaseya.my.authanvil.com/AuthAnvil/SAS.asmx
  6. Define a White listed User that will not require Two Factor Authentication.2favrpws2.png
  7. Select Verify Settings.
    2favrpws3.png
  8. Once you see the settings are valid select Next.
  9. Now that you have the logon protection configured you can select Finish to apply the settings.2fa5.PNG

You should now see the same logon prompt when a user that is required to use 2FA logs in.


2fa6.PNG

This will now allow you to configure the module to accept SAML Access from OKTA

  1. Log back into VSA.
  2. Select AuthAnvil.
  3. Select Configure Kaseya Logon.
  4. In Kaseya Single sign on area at bottom, Upload the Certificate (*.cer file) that was downloaded from Okta.
  5. Set the Reply to URL to:
    1.  (https://[sub-domain for the Kaseya server]/vsapres/web20/core/ssologin.aspx)

  6. Select the “Enable Sign Sign On to Kaseya” check box.
    8.png

  7. Select Save changes.

  8. Test Single Sign on from Okta.

 

 

 

 

Was this article helpful?
0 out of 0 found this helpful
Have more questions? Submit a request

0 Comments

Article is closed for comments.