Configure SAML 2.0 single sign-on (SSO) in Okta
As a Creovai Admin user you can configure SAML 2.0 single sign-on (SSO) using Okta identity provider.
What we'll cover:
Configuring Okta IdP for SAML 2.0 SSO
- Add Creovai as a new SAML 2.0 Web application
- Create a SAML integration
- Provide the IdP metadata to Creovai
- Configure SAML SSO for a specific IdP
Getting started: In the SAML SSO configuration example in this article, Creovai is the service provider and Okta is the identity provider (IdP). The majority of SAML 2.0 compliant identity providers require the same information about the service provider for setup.
Before you begin:
Before you can configure SAML 2.0 SSO in Okta, you'll need:
- to be an Administrator of your organization’s Creovai users so you can activate users and test the integration.
- an Okta account with Administrator privileges.
Configuring Okta IdP for SAML 2.0 SSO
This section shows you how to configure the identity provider, Okta, to enable SAML single sign-on in Creovai.
Within Okta you’ll first add Creovai as a new SAML 2.0 Web application. Finally, you’ll set up a SAML integration and provide the IdP metadata to Creovai.
Add Creovai as a new SAML 2.0 Web application
To begin, you’ll need to sign in to your existing Okta identity provider account using your administrative rights.
Select Applications from the main menu.
On the Applications page, select the Add Application button.
Within the Add Applications page, select the Create New App button.
You’ll see a Create a new Application Integration pop-up, where you’ll choose Web as the platform.
Choose SAML 2.0 as the sign-on method.
Then select Create.
Create a SAML integration
On the Create SAML integration page under the General Settings tab, you’ll give your App a name and description and upload an optional logo.
a) For the App name, use Creovai.
b) Optional: Download this Creovai logo image to use as the App image:c) Select Next to configure SAML.
- On the Configure SAML tab under General SAML Settings section, enter https://mycompanyname.tethr.com/AuthServices/Acs as your single sign-on URL.
Then enter https://mycompanyname.tethr.com/AuthServices as your Audience URI (SP Entity ID).
Under the Attribute Statements section:
a) Enter user.id as the Name.
b) Enter user.login as the first Value.
Proceed through to complete the setup process. When you reach the Sign On tab, under Settings in the Sign On Methods section you’ll see a note to View Setup Instructions.Select View Setup Instructions.
Copy all contents within the Provide the following IDP metadata to your SP provider field, and send this metadata to your Creovai Integrations Specialist.
Provide the IdP metadata to Creovai
To complete SAML SSO configuration for your organization, you'll need to provide Creovai the identity provider (IdP) SAML metadata file you created above, which helps Creovai understand how to communicate with Okta and how to request user authentication.
Forcing SSO by specific email domain
We recommend the organizations who work with Creovai enforce the use of SSO. To enforce SSO in your organization, provide a list of email domains you’d like SSO enforced on to your Creovai Integrations Specialist.
Creovai account activation and sign in experience
When a Creovai user needs to be activated and they’re using SSO, they should utilize the Sign in with Okta button rather than selecting the Activate account button, as shown below:
If you’ve enabled SSO in your organization, your users’ login page will include a Sign in with Okta option as shown below:
Configure SAML SSO for a specific IdP
Configure SAML 2.0 single sign-on (SSO) in OneLoginGuide to SAML 2.0 single sign-on (SSO) settings for your teamArticles in this section
- Guide to SAML 2.0 single sign-on (SSO) settings for your team
- Configure SAML 2.0 single sign-on (SSO) in Azure AD/Microsoft Office 365
- Configure SAML 2.0 single sign-on (SSO) in Okta
- Configure SAML 2.0 single sign-on (SSO) in OneLogin
- Disable two-factor authentication for a user in Creovai
