|   Trend Micro™ Cloud One
Open menu

Cloud Conformity Okta integration guide

Here are the steps to enable SAML SSO using Okta for Cloud Conformity

Okta SAML SSO Integration Set-up

Contact your account manager and SSO@cloudconformity.com for help on how to get started.

Integration Steps


Sign in to Okta as an admin and click on Admin button


Click on Add Applications and then select Create New App


Select SAML 2.0 option


Enter Cloud Conformity in App name field


Click next and enter the following information:

Single sign on URL

Requestable SSO URLs

Name ID format
Email Address

Application username

Click show advanced settings and enter:



To enable IdP-initiated sign-on, set Default RelayState to REGION_OF_SERVICE:YOUR_DOMAIN.com
e.g. us-west-2:example.com


In Configure SAML tab advanced settings upload this X.509 certificate in both Encryption Certificate and Signature Certificate fields.


Configure Role mapping

Users coming through Okta, can take any of the four supported roles in Cloud Conformity:

  • Admin: This role is the organisation administrator and has full access to everything in Cloud Conformity.

  • Power user: This role has full access to all accounts but no organisation-level access, e.g. cannot manage users or add accounts.

  • Read-only: Similar to power user but only with read-only access to all accounts.

  • Custom: Custom users have no access by default and can be granted fine-grained permissions after their first sign-on, by an organisation administrator.

To setup mapping from Okta Groups to Cloud Conformity Roles:

  • Add a group named CC_ADMIN (or use any group you prefer)

  • Assign users you would like to have admin access to Cloud Conformity to CC_ADMIN group

  • Repeat this process for Power user, Read-only and Custom roles as you see fit.

  • In Cloud Conformity application, add a Group Attribute Statement with:
    Name: role
    Filter: regex .*CC.*

    If you have another group name for Cloud Conformity admins, make sure filter regex matches the group name.


In Feedback step, check I'm an Okta customer adding an internal app and It's required to contact vendor to enable SAML then finish setup.


In Sign On tab in the application that you have just created, click on Identity Provider Metadata to download IdP metadata XML file. You will need it to complete the setup later.

Once you have provided identity provider metadata, a member of our team will import it to Cloud Conformity as a trusted identity provider and can begin verifying the integration. Please contact your account manager and SSO@cloudconformity.com for additional help.