👉 Create SAML integration for Didomi Console
- Login to your Okta Developer portal.
- Go to the Admin section.
- In the left menu select Applications > Applications.
- Click on Create App Integration.
- Select SAML 2.0 in the Sign-in method.
- In App name, enter the app where all your SSO SAML settings will be done for Didomi Console (for example: Didomi Console).
- Click on Next.
- Under Configure SAML, enter your SSO identifiers collected from Didomi Console*:
-
Single sign on URL The Login URL value Audience URI (SP Entity ID) The configured issuer value Attribute Statements - Name: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress
- Name format: URI Reference
- Value: user.email
- Click on Next.
- Complete de Feedback step.
- Click on Save.
*Step 8 is required, otherwise the SAML SSO configuration with Okta will not be complete.
👉 Collect your metadata from Okta
- Login to your Okta Developer portal.
- Go to the Admin section.
- In the left menu select Applications > Applications.
- Select the application created in step above for “Didomi Console” example.
- Select the tab Sign-On.
- Click on View setup instructions.
- Copy the below values:
Identity Provider Single Sign-On URL 👉 This will be pasted in Didomi console field Login URL Identity Provider Issuer 👉 This will be pasted in Didomi console field Logout URL X.509 Certificate 👉 Copy the certificate as is
Keep these values for the SSO settings finalization in Didomi Console.
👉 Assign users to Didomi Console application
- Login to your Okta Developer portal.
- Go to the Admin section.
- In the left menu select Applications > Applications.
- Select the application created in step above for “Didomi Console” example.
- Select the tab Assignments.
- Click on Assign.
- Click on Assign to people.
- Follow Okta's instructions.