Okta SSO
Configuring Single Sign-On (SSO) in Okta for Authorium enables centralized identity management and secure access control. This guide walks you through setting up and configuring the integration.
Prerequisitesβ
- Administrator access to the customerβs Okta instance
- Administrator access to Authorium
- SSL certificates for SAML signing
- Understanding of SAML assertion requirements
Configure Okta (Identity Provider Side)β
Step 1: Create a New SAML Applicationβ
- Log in to Okta Admin Console
- Navigate to Applications > Applications
- Click Create App Integration
- Select SAML 2.0 as the Sign-in method
- Click Next
Step 2: Configure SAML Settingsβ
General Settings
- App name:
Authorium - App logo (optional)
Configure SAML Integration
- Single Sign-On URL (ACS URL):
https://app.authorium.com/users/auth/saml/callback - Audience URI (Entity ID):
https://app.authorium.com/auth/saml - Default RelayState (optional)
- Name ID format: Email Address
- Application username: Email
- Single Logout URL:
https://app.authorium.com/users/auth/saml/single_log_out
Advanced Settings
- Response: Signed
- Assertion: Signed
- Authentication context class: PasswordProtectedTransport
- Enable Single Logout: Checked
Configure Attribute Statements (if required)
| Attribute | Value |
|---|---|
user.email | |
| First Name | user.firstName |
| Last Name | user.lastName |
| Additional attributes as needed |
Step 3: Download SAML Documentationβ
Collect and save the following from Okta for Part 2:
- Identity Provider Single Sign-On URL
- Identity Provider Single Logout URL
- Identity Provider Issuer
- X.509 Certificate
- Federation Metadata XML file
Save the Federation Metadata XML as a .txtfile for upload to Authorium.
Configure Authorium (Service Provider Side)β
Step 1: Access SAML Configurationβ
- Navigate to Authorium.
- Sign in with your administrator account.
- Select the appropriate Organization.
- Click the kebab menu to the right of the Organization name.
- Navigate to Internal Authentication.
- Select Single Sign-On.
- For Identity Provider, select Okta.
- For Authentication Protocol, select SAML.
Step 2: Enter SAML Configurationβ
Upload or enter the following fields:
- Federation Metadata XML: Upload the XML file (must be
.txtformat as of 01/30/2025) - SAML Certificate: Copy the X.509 certificate from Okta
- SAML Sign-On Endpoint: Enter the IdP SSO URL
- SAML Log-out Endpoint: Enter the IdP SLO URL
- SAML Issuer: Enter the IdP Issuer URI
Step 3: Verify Configurationβ
Ensure the following Service Provider endpoints are correctly configured:
- ACS URL:
https://app.authorium.com/users/auth/saml/callback - Single Logout URL:
https://app.authorium.com/users/auth/saml/single_log_out - Entity ID:
https://app.authorium.com/auth/saml
Testing the Integrationβ
Step 1: Test Log Inβ
- Identify who on the call is part of the group policy and day-to-day platform users
- Create Authorium membership for one user in the customerβs Okta group policy
- Send the invite link and ask the user to attempt login during the call
- If successful, the integration should work for all users in the group policy
- If unsuccessful, proceed to Troubleshooting
Step 2: Test Log Outβ
- Initiate logout from Authorium
- Verify logout success from both Authorium and Okta
- Confirm redirect to the appropriate post-logout destination
Step 3: Confirm Certificate Expiry Dateβ
You should email support@authorium.com the certificate expiry date to keep on file.
Troubleshootingβ
Common Issues and Solutionsβ
Certificate Issuesβ
- Verify certificate is Base64 encoded X.509 format
- Check certificate expiration dates
- Ensure certificate is copied without extra spaces
- Federation Metadata XML must be uploaded as a
.TXTfile for proper ingestion
URL Mismatchβ
- Confirm all URLs exactly match between IdP and SP
- Check for proper URL encoding
- Verify correct HTTP/HTTPS protocols
-
Do not include https://prefix on the customer's domain entry
User Attribute Issuesβ
- Verify attribute mapping configuration
- Check SAML response for correct attribute formats
- Confirm required attributes are included in the response