New Okta Integration with Aruba Central + Cloud Auth

For customers who use Okta and are looking are for an easy and secure way to onboard clients onto their network, Aruba Central just released a brand new integration. The Cloud Auth feature within Aruba Central now directly integrates with Okta Workforce Identity Cloud and allows users to seamlessly connect to their wired and wireless networks.

Before you Begin

Please review the Cloud Auth configuration overview: https://www.arubanetworks.com/techdocs/central/2.5.8/content/nms/policy/config-cda-in-okta.htm?Highlight=okta

Steps to Configure Okta Workforce Identity Cloud as an Identity Provider

Step 1: Create the Okta Cloud Auth OIDC Application

Step 2: Create the Okta Cloud Auth API Service

Step 3: Configure the Aruba Central Cloud Auth Service

Step 4: Validate and Test

Create the Okta Cloud Auth OIDC Application

Log into the Okta management portal and under Applications click Browse App Catalog

Search for “Cloud Auth OIDC” and click Add Integration.

Once the application is installed Select Sign On > Edit > then Scroll down to the Advanced Sign-on Settings.

Copy the Redirect URI obtained from the user access policy and paste it in the Redirect URI field which is located above the help text. For more information, see Copy Redirect URI.

In the Credentials Details section, for Application username format, select Email.

Click Save.

Create the Okta Cloud Auth API Service

Log in to the Okta Workforce Identity Cloud administration console and under Applications Click Browse App Catalog.

Search for Cloud Auth API Service and Select Add Integration.

Select Install & Authorize and Copy this as the Service Client Secret.

Click Done.

Configure the Aruba Central Cloud Auth Service

Log into Aruba Central as an Admin.

Under the Global view select Security then Authentication & Policy and click Config.

Under User Access Policy click Edit and under identity providers select Okta Workforce Identity Cloud.

Fill in the following fields referencing the values from the Okta ODIC and API applications:

Create the Okta Group to Aruba Client Role Mapping:

At least one mapping must be added. Use the ‘Unspecified’ user group if no other role mappings are needed

Click Save

Onboard Client – Test and Validate

Under the User Access Policy – Click Copy URL or Open

Follow the prompts to install the Aruba Onboard App.

Once the app is installed, it will redirect you to Okta for Authentication.

After successfully authenticating, a unique client cert and profile will be downloaded onto the device.

Verify the client is able to connect to the Cloud Auth enabled SSID.

Check the Cloud Auth logs to see authenticiation information and troubleshoot any issues.