Setting up SSO in Remote with Okta

Article author
Nneka
  • Updated

You can setup Single Sign-On for Remote through certain Identity providers (IdPs). To do this with Okta: 

  1. On the New App Integration wizard, select SAML 2.0.

    okta-sso-step-1.png

  2. Set a name.
    okta-sso-step-2.png

  3. Add the Single sign on URL and Audience URI. These will be different for each customer and will include company slugs. Examples:
    • Single sign on URL: https://[AUTH0_TENANT].us.auth0.com/login/callback?connection=[COMPANY_SLUG]-sso
    • Audience URI: urn:auth0:[AUTH0_TENANT]:[COMPANY_SLUG]-sso

      okta-sso-step-3.png

  4. Define the Attribute Statements. Okta says this is optional, but we need customers to set this up to get access to users name and email when they authenticate on Remote to find their account and (maybe) sync their name:

    okta-sso-step-4.png

  5. Okta specific: Mark the App Integration as internal

    okta-sso-step-5.png

  6. The App Integration was created and we need to retrieve some data to finish the setup on Remote. Scrolling down, customers can find the View SAML setup instructions link.

    okta-sso-step-6.png

  7. On the setup instructions page, they can retrieve the Identity Provider Single Sign-On URL and X.509 Certificate . They will need to input this data on Remote to finish the setup.

    okta-sso-step-7.png

  8. Okta specific: Assign users/groups that can use the app, otherwise they won’t be able to get authenticated through it.

okta-sso-step-8.png

 

Was this article helpful?

0 out of 1 found this helpful

Have more questions? Submit a request

Comments

0 comments

Article is closed for comments.