This setup might fail without parameter values that are customized for your organization. Please use the Okta Administrator Dashboard to add an application and view the values that are specific for your organization.
Enabling SAML affects all users who use this application, which means that users can't sign-in through their regular sign-in page. They can only access the app through the Okta service.
HackEDU doesn't provide a backup sign-in URL where users can sign-in using their normal username and password. You can call HackEDU Support (email@example.com) to turn off SAML, if necessary.
The Okta/HackEDU SAML integration currently supports the following features:
For more information on the listed features, visit the Okta Glossary.
Log in to HackEDU.
Navigate to Admin > Settings, scroll down to SSO, then click Edit for Metadata File:
Enter the following:
URL: Copy and paste the following:
Sign in to the Okta Admin app to have this variable generated for you
Toggle the switch to Enable SSO Integration and make a copy of your Domain value, marked in red:
Enter your email, then click Continue:
Since the application only supports an SP-initiated flow, you can simulate an IdP-initiated flow with the Bookmark sign-on method. In Okta add another HackEDU app and follow the steps below:
Now you can hide the original app on the end user dashboard. Go to the General tab in Okta and check Do not display application icon to users: