WorkOS Docs Homepage
Integrations

Okta SAML

Learn how to configure a connection to Okta via SAML.

Each SSO Identity Provider requires specific information to create and configure a new Connection. Often, the information required to create a Connection will differ by Identity Provider.

To create an Okta Connection, you’ll need three pieces of information: an ACS URL, an SP Entity ID, and an IdP Metadata URL.

Start by logging in to your WorkOS dashboard and browse to the “Organizations” tab on the left hand navigation bar.

Select the organization you’d like to configure an Okta Connection for, and select “Manually Configure Connection” under “Identity Provider”.

A screenshot showing where to find "Manually Configure Connection" in the WorkOS Dashboard.

Select “Okta” from the Identity Provider dropdown, enter a descriptive name for the connection, and then select the “Create Connection” button.

A screenshot showing "Create Connection" details in the WorkOS Dashboard.

WorkOS provides the ACS URL and the SP Entity ID. It’s readily available in your Connection Settings in the WorkOS Dashboard.

A screenshot showing where to find the ACS URL and SP Entity ID in the WorkOS Dashboard.

The ACS URL is the location an Identity Provider redirects its authentication response to. In Okta’s case, it needs to be set by the organization when configuring your application in their Okta instance.

The SP Entity ID is a URI used to identify the issuer of a SAML request, response, or assertion. In this case, the entity ID is used to communicate that WorkOS will be the party performing SAML requests to the organization’s Okta instance.

Specifically, the ACS URL will need to be set as the “Single Sign-On URL” and the SP Entity ID will need to be set as the “Audience URI (SP Entity ID)” in the “Configure SAML” step of the Okta “Edit SAML Integration” wizard:

A screenshot showing where to place the WorkOS Single Sign-On URL and SP Entity ID in the Okta Dashboard.

Next, provide the IdP Metadata URL. Normally, this information will come from the organization’s IT Management team when they set up your application’s SAML 2.0 configuration in their Okta admin dashboard. But, should that not be the case during your setup, the next steps will show you how to obtain it.

Log in to Okta, go to the admin dashboard, and select “Applications” in the navigation bar.

A screenshot showing how to navigate to existing applications in the Okta Dashboard.

If your application is already created, select it from the list of applications and move to Step 7.

A screenshot showing existing applications in the Okta Dashboard.

If you haven’t created a SAML application in Okta, select “Create App Integration”.

A screenshot showing how to select "Create App Integration" in the Okta Dashboard.

Select “Create New App”, then select “SAML 2.0” as a Sign on method, then click “Next”.

A screenshot showing the sign-in method selection in the Okta Dashboard.

Enter a descriptive App name, then click “Next”.

A screenshot showing App name creation in the Okta Dashboard.

Input the ACS URL from your WorkOS Dashboard as the “Single Sign-On URL” and input the SP Entity ID from your WorkOS Dashboard as the “Audience URI (SP Entity ID)”.

A screenshot showing where to place the WorkOS Single Sign-On URL and SP Entity ID in the Okta Dashboard.

Scroll down to the “Attribute Statements” section and use the “Add Another” button to add the following key-value pairs.

  • iduser.id
  • emailuser.email
  • firstNameuser.firstName
  • lastNameuser.lastName
A screenshot showing the "Attribute Statements" configuration in the Okta Dashboard.

With identity provider role assignment, users can receive roles within your application based on their group memberships. To return this information in the attribute statement, follow the guidance below.

Scroll down to the Group Attribute Statements configuration. The Name should be set to groups, and you can define a filter to map the necessary Okta groups. To map all groups, filter by matching the regex .*, as shown in the screenshot below. You can preview the SAML Assertion to check that all attributes have been mapped correctly. Then, click “Next”.

A screenshot showing the "Groups Attribute Statement" configuration in the Okta Dashboard.

Finish role assignment set-up by navigating to the Connection page in the Organization section of the WorkOS Dashboard. Create connection groups referencing the group IdP ID. Then, assign roles to connection groups so users in those groups will automatically be granted roles within your application.

Select “I’m an Okta customer adding an internal app” from the options menu. Complete the form with any comments and select “Finish”.

A screenshot showing where to submit application feedback in the Okta Dashboard.

To give users permission to authenticate via this SAML app, you will need to assign individual users and/or groups of users to the Okta app.

Click on the “Assignments” tab, and select either “Assign to People” or “Assign to Groups”.

A screenshot showing the Okta Application "Assignments" tab in the Okta Dashboard.

Find the individual user(s) and/or group(s) that you would like to assign to the app, and click “Assign” next to them. Click “Done” when you are finished.

A screenshot showing the selecting of groups to add to the Application in the Okta Dashboard.

Click on the “Sign On” tab of the SAML app you just created.

Click the “Actions” dropdown for the correct certificate and select “View IdP Metadata.”

A screenshot showing the "View IdP Metadata" selection in the Okta Dashboard.

A separate tab will open. Copy the link in the browser.

A screenshot of the IdP Metadata XML URL in the Okta Dashboard.

Back in the WorkOS Dashboard, click on “Edit Metadata Configuration” in the “Identity Provider Configuration” section of the Connection. Input the Metadata URL and click “Save Metadata Configuration”. Your Connection will then be linked and good to go!

A screenshot showing where to place the Okta IdP Metadata URL in the WorkOS Dashboard.