<iframe src="https://www.googletagmanager.com/ns.html?id=GTM-M74D8PB" height="0" width="0" style="display:none;visibility:hidden">
Loading
Skip to NavigationSkip to Main Content
Okta IWA Desktop SSO SSL Server's Certificate Is Not Being Trusted by Clients
Integrations
Okta Classic Engine
Directories
Overview

Our end users receive a warning message on their browsers indicating that our Desktop SSO server certificate is untrusted.

Applies To
  • Desktop SSO 
  • SSL Certificates
  • Okta Classic Engine
Cause
  • The Desktop SSO server is using a self-signed certificate.
  • The name specified in the certificate's Common Name or SAN field does not match the value entered in the IWA redirect URL field on the On-Prem Desktop SSO configuration page in the Okta Admin Console.
Solution

NOTE: This guide assumes general familiarity with IIS and creating SSL Certificates via a Certificate Authority (CA) on the domain, or via a third-party CA such as DigiCert or GoDaddy. Please refer to the Configure SSL section of
Install and configure the Okta IWA Web App for Desktop SSO​ for general guidelines on how to create a certificate and configure IIS for use with Desktop SSO.

 

  1. When creating the certificate, the convention (hostname vs FQDN) used in the certificate's Common Name field must match what is used in the IWA redirect URL field in the Okta Admin Console's On Prem Desktop SSO configuration page, AND in the Host Name field in the HTTPS binding in IIS (if specified).

    • To view the IWA Redirect URL currently configured in the Okta Admin Console, navigate to Security > Delegated Authentication and scroll to the IWA Agents section.  The IWA Redirect URL will be displayed as shown below:

      IWA Agents

  2. To view the Common Name of an existing certificate, double-click the certificate in IIS or the Certificate MMC Snap-In. The Common Name is displayed as the Issued to address field of the General tab:

Certificate Information 

  • In the above example, the certificate is issued using a hostname (IWASever) instead of an FQDN (for example, IWAserver.company.com). This would result in the following:

  • If planning to use multiple Desktop SSO servers for failover purposes, it is possible to create a wildcard certificate that can be used on each server within the same domain.

    • When entering the server's FQDN in the Common Name, replace the server's hostname with * (for example, *.company.com).
    • If using a wildcard, use the server's FQDN in the IWA redirect URL field in Okta.
  • If using the FQDN instead of the hostname, the server's URL must be added to the client's Local Intranet Zone to prevent an authorization prompt from appearing.

Loading
Okta IWA Desktop SSO SSL Server's Certificate Is Not Being Trusted by Clients