Connect ConfigCat with Okta via SAML.
Each SSO Identity Provider requires specific information to configure a SAML integration. The following guide will walk you through on how you can connect ConfigCat with Okta as a SAML Identity Provider.
Log in to Okta, go to the admin dashboard, and select
Create App Integration.
SAML 2.0as the Sign-in method.
Enter a descriptive
App name, then click
The next step will guide you on how to collect the information required for the appearing
Configure SAML section.
Open your organization's authentication settings on the ConfigCat dashboard.
Select the domain you want to configure with SAML, and click
SAML SSO status.
From the appearing dialog, copy the following values and paste them into the Okta application.
Audience URI (SP Entity ID)
Assertion Consumer Service->
Single sign on URL
Name ID formatto
EmailAddress, then click
I'm an Okta customer adding an internal app. Complete the form with any comments and click
You can choose one of the following options to configure ConfigCat with SAML Identity Provider metadata.
- Metadata URL
- Manual Configuration
Sign Ontab, and copy the URL of
Identity Provide metadata.
Paste the copied value into the
Metadata URLfield at ConfigCat.
- Click on
Sign Ontab, and click on
View Setup Instructions.
Copy the value of the
Identity Provider Single Sign-On URLand
X.509 Certificatefields and paste them into the Configuration dialog at ConfigCat.
- Click on
To let users authenticate via SAML, you need to assign individual users or groups to the Okta application.
Assignmentstab, and select either the
Assign to Peopleor the
Assign to Groupsoption.
Go to the ConfigCat Log In page, and click
COMAPNY ACCOUNT - SAML.
Sign in with your company email address assigned to the Okta application.
ConfigCat will redirect you to Okta's sign in page. Type your credentials, and click
You should be redirected to ConfigCat signed in with your company account.
- Configure the auto-assignment of users.