Login to Trakstar as an administrator.
Navigate to Settings > Authentication & SSO. Under SAML 2.0, click Configure:
On the Configuration for SAML 2.0 page, enter the following information (see screen shot at end of step for reference):
IDP SSO TARGET URL: Copy and paste the following:
Sign into the Okta Admin Dashboard to generate this variable.
IDP CERTIFICATE FINGERPRINT: You can leave this field blank.
IDP CERTIFICATE: Copy and paste the following (PEM text format):
Sign into the Okta Admin Dashboard to generate this variable.
ISSUER: Change this value from: https://app.trakstar.com to: app.trakstar.com (remove the "https://")
ACS (CONSUMER) URL: Make a copy of this value, you will need it in Okta.
Click Save.
In Okta, select the General for the Trakstar app, then click Edit.
Take the value for Company Name from the ACS (CONSUMER) URL value you took note of earlier.
For example, if the ACS (CONSUMER) URL is: https://app.trakstar.com/auth/saml/callback?namespace=YourCompanyName
Then your Company Name is YourCompanyName.
Click Save.
Done - You can now start assigning users to the application.
Notes:
Follow the instructions here to test and enable the integration, and for tips on troubleshooting.
Note that the username that Okta sends must match the usernames within Trakstar. Trakstar supports email addresses as usernames, but can also support other formats. If necessary, change the Application username format under the Sign On tab.
As an alternative to adding Trakstar from the Okta Application Network, you can also create a custom SAML application for Trakstar within Okta. If you do, the Single Sign On URL, Recipient URL, and Destination URL should all be the same, set to your ACS (Consumer) URL from within Trakstar.