Skip to main content

How to Configure Security Assertion Markup Language (SAML) IDP in OKTA Admin Console

This document provides information on how to configure SAML IDP for Oloid SSO in the OKTA Admin Console.

Updated today

Introduction

This document explains how to configure Security Assertion Markup Language (SAML) as an Identity Provider (IdP) using Okta for Oloid application. The configuration involves creating a SAML IdP in the Okta Admin Console and configuring Oloid application with the SAML.

Prerequisites

Steps to Add Identity Provider

  1. On the home page of the Okta Admin Console, go to Security > Identity Providers.

    Identity Providers page is displayed.

  2. Click Add Identity provider.

    The identity provider list is displayed.

  3. Select SAML and click Next.

    The Configure SAML 2.0 IdP popup box is displayed.

  4. Do the following:

    1. Under General settings section, enter Name for the Identity Provider configuration.

    2. Under Account matching with IdP Username section:

      1. Select IdP username from dropdown list.

        Note: It is advised to select idpuser.subjectNameId in the IdP Username field.

      2. If no match is found, select Redirect to Okta Sign-in page.

  5. Under SAML Protocol Settings sections:

    1. Enter the IdP Issuer URL.

      See Tenant Admin Portal > Identity Provider > SAML Application > Oloid Metadata tab and copy Entity ID.

    2. Enter the IdP Single Sign-On URL.

      See Tenant Admin Portal > Identity Provider > SAML Application > Oloid Metadata tab and copy Sign-on URL.

    3. Upload the IdP Signature Certificate.

      To download, go to Tenant Admin Portal > Identity Provider > SAML Application > Oloid Metadata tab and select Download Certificate.

    4. Request Signature, Unselect the Sign SAML Authentication Request.

    5. Select Response in Response Signature Verification.

    6. Click Finish.

      IDP created successfully and listed under Security > Identity Providers.

      Note: In the search bar, you can search using identity provider name.

  6. Go to IDP details and do the following:

    1. Download the Metadata file and upload it in the Metadata field under Tenant Admin Portal > Identity Provider > SAML Application > IDP Settings > Metadata.

      OR

    2. Copy IDP ID and enter it in Tenant Admin Portal > Identity Provider > SAML Application > IDP Settings > Entity ID.

    3. Copy Assertion Consumer Service URL and enter it in Tenant Admin Portal > Identity Provider > SAML Application > IDP Settings > ACS URL.

Add Routing Rules

Steps to add Routing Rules

  1. In the Okta Admin Console, on Identity Providers Screen, go to Routing rules > Click Add Routing Rule.

    The Add Rule pop-up box is displayed.

  2. Do the following:

    1. Enter Rule Name.

    2. Select User matches from the Dropdown list.

      Note: Select Regex on Login and enter the mail.

    3. Select Use this Identity provider from the drop-down list.

      Note: Select the Identity Provider added in Step 1.

    4. Click Create rule.

      The rule is created successfully and added on the Routing Rule list.

  3. Configure the IDP Profile in the Tenant Admin Portal.

    1. On the homepage of the portal, select the preferred IDP to edit.

    2. On the IDP details page, select the WebKey Application from Select WebKey Application dropdown.

    3. Click Save.


Keywords

| Okta SAML IdP configuration | Configure Okta SAML with Oloid |

Did this answer your question?