Okta

How to Configure SAML 2.0 for Pathgather

Read this before you enable SAML

The Pathgather application is pre-configured to pass the required custom attributes Job Title and Department (which are mapped to title and department in Okta User Base Profile) as part of the SAML assertion. These attributes are required to use SAML and perform Just in Time (JIT) provisioning for Pathgather.

Make sure that the title and department attributes are populated in the Okta User Base Profile, and also have the correct attribute mappings set with AD/LDAP. If this value is empty, Okta will pass a null values to Pathgather.

Contents


Supported Features

The Okta/Pathgather SAML integration currently supports the following features:

For more information on the listed features, visit the Okta Glossary.


Configuration Steps

  1. Generate the following IDP Metadata and save to a file named metadata.xml:

     
  2. Send an email to Pathgather Support and request that they enable SAML 2.0 for your organization. Include the following with your email:

    • Attach the metadata.xml file you created in step 1.

    • Provide the following list of attribute keys:

       first_name, last_name, email, job_title, department 

  3. Pathgather will process your request and enable SAML for your account.
  4. Done!



Notes


SP-initiated SSO

Go to your Pathgather URL

For example: https://[subdomain].pathgather.com