Okta

How to Configure SAML 2.0 for Instructure Bridge


Read this before you enable SAML

Enabling SAML will affect all users who use this application, which means that users will not be able to sign-in through their regular log-in page. They will only be able to access the app through the Okta service.

Backup URL

Instructure Bridge does not provide a backup log-in URL where users can sign-in using their normal username and password. Please reach out to Instructure Bridge support team in order to disable SAML authentication for your account.

Contents


Supported Features

The Okta/Instructure Bridge SAML integration currently supports the following features:

For more information on the listed features, visit the Okta Glossary.


Configuration Steps

  1. Sign in to Instructure Bridge as an administrator.

  2. Navigate to Application Switcher > ADMIN:

    instructure.png

  3. Select the AUTH tab:

    instructure2.png

  4. Search for the SAML 2.0 option, then click Enable:

     Search for the SAML 2.0 option and click Enable

  5. Enter the following:

    • Identity Provider Metadata URL: Copy and paste the following:

      Sign into the Okta Admin dashboard to generate this value.

    • Name ID Format URN: Enter urn:oasis:names:tc:SAML:2.0:nameid-format:persistent

    • Click Save:

      Ener Metadata URL and Name ID Format URN: urn:oasis:names:tc:SAML:2.0:nameid-format:persistent

  6. Make a copy of the ACS URL and Audience URI values:

    Make a copy of the ACS URL and Audience URI values

  7. In Okta, select the Sign On tab for the Instructure Bridge app, then click Edit.

    • Scroll down to the ADVANCED SIGN-ON SETTINGS section.

    • Enter the ACS URL and Audience URI values from Step 6 into the corresponding fields.

    • Click Save:

    Enter the ACS URL and Audience URI in Okta - Sign On page

  8. Done!


Notes

SP-initiated SSO

Open your Instructure Bridge login URL: https://[subDomain].bridgeapp.com/