👉 Create SAML integration for Didomi Console
- Login to your Okta Admin portal.
- In the left menu select Applications > Applications.
- Click on Create App Integration.
- Select SAML 2.0 in the Sign-in method.
- In App name, enter the app where all your SSO SAML settings will be done for Didomi Console (for example: Didomi Console).
- Click on Next.
- Under Configure SAML, enter your SSO identifiers collected from Didomi Console*:
-
Single sign on URL The Login URL value Audience URI (SP Entity ID) The configured issuer value
Attribute Statements - Name: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress
- Name format: URI Reference
- Value: user.email
- You can find this information from the Marketplace section of the Didomi console.
- Go to the "Manage" tab and enter the "SSO" box.
- You will find there your SSO SAML identifiers.
9. Click on Next.
10. Complete the Feedback step.
11. Click on Save.
*Step 8 is required, otherwise the SAML SSO configuration with Okta will not be complete.
👉 Collect your metadata from Okta
- Login to your Okta Admin portal.
- In the left menu select Applications > Applications.
- Select the application created in step above for “Didomi Console” example.
- Select the tab Sign-On.
- Under SAML 2.0, go to Metadata details and click more details.
- Copy the below values:
Sign-On URL 👉 This will be pasted in Didomi console field Login URL Issuer 👉 This will be pasted in Didomi console field Logout URL Signing Certificate 👉 Copy the certificate as is
Keep these values for the SSO settings finalization in Didomi Console.
7. Go to the Marketplace section of the Didomi console, then to the "Manage" tab and enter the "SSO" box.
Paste them here :
👉 Assign users to Didomi Console application
- Login to your Okta Admin portal.
- In the left menu select Applications > Applications.
- Select the application created in step above for “Didomi Console” example.
- Select the tab Assignments.
- Click on Assign.
- Click on Assign to people.
- Follow Okta's instructions.