SSO: Okta SAML Integration set-up
This section will help you create a SAML integration and get a metadata.xml file from your SSO Identity Provider Okta.
Configure the SAML integration
On your Okta account, go to the admin settings http://{your-workspace}-admin.okta.com
On the left panel, click on Applications > Applications >
Create a new application integration by selecting SAML2.0, then go Next
Complete each step as follows:
General Settings
App name
AB Tasty
Single Sign on (url)
Audience URI (SP Entity ID):
Default Relay State
Name ID format
EmailAddress
Application user name
Email
Attribute Statements (optional)
Name: mail
Value: user.email
Feedback
Select the following answers:
Are you a customer or partner?
I'm an Okta customer adding an internal
App Type
This is an internal app that we have created
Click on Finish.
Get metadata.xml file
SAML signing certificates
Go back to the App settings.
Click on the Sign On tab.
Scroll down to the SAML Signing Certificates section.
Make sure the current certificate is Active
Click on Actions>View IdP metadata
Your metadata.xml file is created.
You can now import it on AB Tasty.
To ensure your XML is valid, you can use online tools such as https://www.samltool.com/validate_xml.php
Save the file named yourcompany.xml.
Once the configuration is done, use the metada.xml along with your testing credential to configure the SSO on your AB Tasty account.
User assignments
This section will allow access to abtasty-idp for a single user or a group:
On your Okta account, go to the admin settings http://{your-workspace}-admin.okta.com
On the left panel, click on Applications > Applications > Assign
Select Assign to people for a single user access, or Assign to group to grant access for a previously created group.
Use the search bar to find the targeted user or group
Click Assign beside every entity you want to grant access.
To save the selection and grant SSO access, click Done.
Last updated
Was this helpful?