Configure SSO SAML with Okta

👉 Create SAML integration for Didomi Console

  1. Login to your Okta Admin portal.
  2. In the left menu select Applications > Applications.
  3. Click on Create App Integration.
  4. Select SAML 2.0 in the Sign-in method.
  5. In App name, enter the app where all your SSO SAML settings will be done for Didomi Console (for example: Didomi Console).
  6. Click on Next.
  7. Under Configure SAML, enter your SSO identifiers collected from Didomi Console*:

  8. Single sign on URL The Login URL value
    Audience URI (SP Entity ID) The configured issuer value
    Attribute Statements
    1. Name: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress
    2. Name format: URI Reference
    3. Value: user.email
  9. Click on Next.
  10. Complete de Feedback step.
  11. Click on Save.

*Step 8 is required, otherwise the SAML SSO configuration with Okta will not be complete.

👉 Collect your metadata from Okta

  1. Login to your Okta Admin portal.
  2. In the left menu select Applications > Applications.
  3. Select the application created in step above for “Didomi Console” example.
  4. Select the tab Sign-On.
  5. Under SAML 2.0, go to Metadata details and click more details.
  6. Copy the below values:
    Sign-On URL 👉 This will be pasted in Didomi console field Login URL
    Issuer 👉 This will be pasted in Didomi console field Logout URL
    Signing Certificate 👉 Copy the certificate as is

Keep these values for the SSO settings finalization in Didomi Console.

 👉 Assign users to Didomi Console application

  1. Login to your Okta Admin portal.
  2. In the left menu select Applications > Applications.
  3. Select the application created in step above for “Didomi Console” example.
  4. Select the tab Assignments.
  5. Click on Assign.
  6. Click on Assign to people.
  7. Follow Okta's instructions.