Read this before you enable SAML
Enabling SAML will affect all users who use this application, which means that users will not be able to sign in through their regular sign-in page. They will be able to access the app through the Okta service.
Backup URL
[AppName] doesn't provide a backup sign-in URL where users can sign in using their regular username and password. You can contact [AppName] Support (support@[AppName].com) to turn off SAML, if necessary.
The Okta/[AppName] SAML integration currently supports the following features:
For more information on the listed features, visit the Okta Glossary.
Contact the [AppName] Support team (support@[AppName].com) and request that they enable SAML 2.0 for your account.
Include the Metadata URL located on the Sign On tab > Sign on methods > SAML 2.0 -> Metadata details with your request.
[AppName] Support will process your request and will provide you with the SSO ID and Encryption Certificate. After receiving a confirmation email, you can start assigning people to the application.
In Okta, select the Sign On tab for the [AppName] SAML app, then click Edit: .
Encryption Certificate: Upload your certificate (step 3)
Scroll down to Advanced Sign-on Settings
Enter your SSO ID (step 3)
Application username format: Select email
Click Save
The following SAML attributes are supported:
Name | Value |
---|---|
user.email | |
firstName | user.firstName |
lastName | user.lastName |
Go to Go to https://app.example.com/
Enter your email, then click Continue.