How to Configure SAML 2.0 for [AppName]

Read this before you enable SAML

Enabling SAML will affect all users who use this application, which means that users will not be able to sign in through their regular sign-in page. They will be able to access the app through the Okta service.

Backup URL

[AppName] doesn't provide a backup sign-in URL where users can sign in using their regular username and password. You can contact [AppName] Support (support@[AppName].com) to turn off SAML, if necessary.


Supported Features

The Okta/[AppName] SAML integration currently supports the following features:

For more information on the listed features, visit the Okta Glossary.

Configuration Steps

  1. Contact the [AppName] Support team (support@[AppName].com) and request that they enable SAML 2.0 for your account.

  2. Include the Metadata URL located on the Sign On tab > Sign on methods > SAML 2.0 -> Metadata details with your request.

  3. [AppName] Support will process your request and will provide you with the SSO ID and Encryption Certificate. After receiving a confirmation email, you can start assigning people to the application.

  4. In Okta, select the Sign On tab for the [AppName] SAML app, then click Edit: .

    • Encryption Certificate: Upload your certificate (step 3)

    • Scroll down to Advanced Sign-on Settings

    • Enter your SSO ID (step 3)

    • Application username format: Select email

    • Click Save


The following SAML attributes are supported:

SP-initiated SSO

  1. Go to Go to https://app.example.com/

  2. Enter your email, then click Continue.