Skip to content

Okta SAML

This guide walks you through configuring Okta as your SAML identity provider for the application you are onboarding, enabling secure single sign-on for your users. You’ll learn how to set up an enterprise application, configure SAML settings to the host application. By following these steps, your users will be able to seamlessly authenticate using their Okta credentials.

  1. Login to your Okta Admin Console. Go to Applications→ Applications.

  2. In the Applications tab, click on Create App Integration.

  3. Choose SAML 2.0, and click on Next.

  4. Give your app a name, choose your app visibility settings, and click on Next.

  1. Copy the SSO URL from the SSO Configuration Portal. Paste this link in the space for SSO URL on the Okta Admin Console.

  2. Copy the Audience URI (SP Entity ID) from the SSO Configuration Portal, and paste it in your Okta Admin Console in the space for Audience URI.

  3. You can leave the Default Relay State as blank. Similarly, select your preferences for the Name ID format, Application Username, and Update application username on fields.

Check the Attribute Mapping section in the SSO Configuration Portal, and carefully map the same attributes on your Okta Admin Console.

Attribute mapping on SSO Configuration Portal Attribute mapping on Okta Admin Console

  1. Go to the Assignments tab.

    Locate Assignments tab

  2. Click on Assign on the top navigation bar, select Assign to People/Groups.

    Select Assign to People or Groups

  3. Click on Assign next to the people you want to assign it to. Click on Save and Go Back, and click on Done.

    Assign specific individuals or groups to app

  1. Preview your SAML Assertion generated, and click on Next.

    Preview SAML Assertion

  2. Fill the feedback form, and click on Finish once done.

    Feedback form after configuring SAML

  1. On the Sign On tab copy the Metadata URL from the Metadata Details section on Okta Admin Console.

    Copy Metadata URL from Okta Admin Console

  2. Under Identify Provider Configuration, select Configure using Metadata URL, and paste it under App Federation Metadata URL on the SSO Configuration Portal.

    Paste Metadata URL on SSO Configuration Portal

Click on Test Connection. If everything is done correctly, you will see a Success response as shown below.

Test SSO configuration

Click on Enable Connection. This will let all your selected users login to the new application via your Okta SSO.

Enable SSO on Okta Admin Console

With this, we are done configuring your Okta application for an SSO login setup.