Configure SSO SAML with Okta

👉 Create SAML integration for Didomi Console

  1. Login to your Okta Developer portal.
  2. Go to the Admin section.
  3. In the left menu select Applications > Applications.
  4. Click on Create App Integration.
  5. Select SAML 2.0 in the Sign-in method.
  6. In App name, enter the app where all your SSO SAML settings will be done for Didomi Console (for example: Didomi Console).
  7. Click on Next.
  8. Under Configure SAML, enter your SSO identifiers collected from Didomi Console*:

  9. Single sign on URL The Login URL value
    Audience URI (SP Entity ID) The configured issuer value
    Attribute Statements
    1. Name: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress
    2. Name format: URI Reference
    3. Value: user.email
  10. Click on Next.
  11. Complete de Feedback step.
  12. Click on Save.

*Step 8 is required, otherwise the SAML SSO configuration with Okta will not be complete.

👉 Collect your metadata from Okta

  1. Login to your Okta Developer portal.
  2. Go to the Admin section.
  3. In the left menu select Applications > Applications.
  4. Select the application created in step above for “Didomi Console” example.
  5. Select the tab Sign-On.
  6. Click on View setup instructions.
  7. Copy the below values:
    Identity Provider Single Sign-On URL 👉 This will be pasted in Didomi console field Login URL
    Identity Provider Issuer 👉 This will be pasted in Didomi console field Logout URL
    X.509 Certificate 👉 Copy the certificate as is

Keep these values for the SSO settings finalization in Didomi Console.

 👉 Assign users to Didomi Console application

  1. Login to your Okta Developer portal.
  2. Go to the Admin section.
  3. In the left menu select Applications > Applications.
  4. Select the application created in step above for “Didomi Console” example.
  5. Select the tab Assignments.
  6. Click on Assign.
  7. Click on Assign to people.
  8. Follow Okta's instructions.