Use Okta as your Identy Provider

Overview

After enabling Onum as a service provider, you can set up Okta as an identity provider for SAML. You need to create a SAML app in your Okta admin dashboard to register your Callback URL so that Okta can send SAML responses to the correct location.

Set up your custom Okta app

1

Log in to your Okta admin dashboard. In the left menu, go to Applications > Create App Integration. Choose SAML 2.0 as the Sign-in method and click Next.

2

Enter a name for the app (e.g., MyApp SAML SSO) and optionally, upload an app icon. Click Next.

3

Now, enter these details from Onum:

Parameter
Description

Single sign-on URL / Audience URI

Enter a temporary URL in these fields (eg, https://placeholder.example.com/saml/acs). You can copy the Callback URL if you already know it, or just use a dummy placeholder. We'll edit these fields later with the real value.

Default RelayState

You can leave this blank.

Name ID format

Select Unspecified.

Application username

Select Email.

Click Next when you're done.

4

Choose which users or groups in Okta should have access, then click Done.

5

Once the app is created, Okta provides you with the IdP metadata.

Now access Onum and go to the Authentication area in your Admin menu. Once there, click the Configure Single-Sign-On button and select SAML in the Authentication method field. Enter the following in the fields that appear:

Parameter
Description

IdP Entity ID

Enter the Identity Provider Issuer from your Okta app.

Single Sign-On URL

Enter the Identity Provider Single Sign-On URL from your Okta app.

Certificates

Paste the X.509 Certificate from your Okta app.

Now click Save. You'll be given a Callback URL.

6

Go back to your Okta dashboard and click Applications > Your SAML App > General > SAML Settings > Edit. Replace the placeholders with the real Callback URL you got in Onum. Save changes.

Done! Okta is now your identity provider for Onum.

Last updated

Was this helpful?