Okta SSO Configuration

Okta is an SAML 2.0 compatible SSO solution, which can be integrated with your Appbot Premium account or added to a Large plan. 

The first step is to set up Appbot in your Okta organization.

In SAML terminology, what you will be doing here is configuring Okta (your SAML Identity Provider or “SAML IdP”), with the details of Appbot (the new SAML Service Provider or “SAML SP”).

Before you configure your Okta SSO integration

Head to the Appbot SSO page and copy your Appbot SSO ID.
SSO ID number screenshot

How to set up Appbot as a Service Provider in Okta

  1. Log in to your Okta Organization as a user with administrative privileges.
  2. Click on the blue “Admin” button 
  3. Click on the “Add Applications” shortcut
  4. Click on the green “Create New App” button
  5. In the dialog that opens, select the “SAML 2.0” option, then click the green “Create” button.
    create a new application integration screenshot
  6. In Step 1 “General Settings”, enter “Appbot” in the “App name” field, then click the green “Next” button.general settings screenshot
  7. In Step 2 “Configure SAML,” section A “SAML Settings”, paste the URL below into the “Single sign-on URL” (replacing “your_org” with the Appbot SSO ID):
    https://app.appbot.co/sso/your_org/saml/consume
  8. and the following into the “Audience URI (SP Entity ID)” field (replacing “your_org” with the Appbot SSO ID. The org ID should be alphanumeric characters only.):
    https://app.appbot.co/sso/your_org/saml/metadataSAML screenshot
  9. Configure the other attributes as shown in this screenshot;
    1. Default RelayState: leave blank
    2. Name ID format: Persistent
    3. Application username: Emailconfiguration settings screenshot
  10. In the “Attribute Statements” section, add three attribute statements (with the exact capitalizations shown)
    1. “User.FirstName” set to “user.firstName”
    2. “User.LastName” set to “user.lastName”
    3. “User.email” set to “user.email”
      attribute statements screenshot
  11. Click Next to continue.
  12. In Step 3 “Feedback”, select “I’m an Okta customer adding an internal app”, then click Finish on this single sign-on solutions.
  13. Navigate to the “Sign On” section of your newly created Appbot single sign-on application. Copy the “Identity Provider metadata” link, it should be similar to https://yourorg.okta.com/app/xxx/sso/saml/metadata.
  14. Head back to the Appbot SSO page and select “I’m ready to send the metadata” button.
  15. Add the metadata URL provided by Okta, leave the Name ID Format as “– detect from metadata–, then the “Create” button.
  16. A success message will show at the top of the page and you are now all set to use SSO on the Appbot account.

If you need any further assistance with Okta single sign-on or any of Appbot’s other single sign-on solutions, don’t hesitate to contact us with any questions or check out our FAQ section here.

Was this article helpful?

Related Articles