Okta SSO via SAML
Setting up Okta via SAML
Set up SSO for OKta using SAML. For a general overview on SAML, see Setting up SAML2 Federated SSO.
If you do not see SAML in the SSO list, please create a support ticket to enable SAML for your account.
Setting up SAML SSO for Okta includes:
- Configuring SSO settings for Okta via SAML in Codefresh
- Configuring SSO settings for Codefresh in JumpCloud
- Completing SSO configuration for JumpCloud in Codefresh
Step 1: Configure SSO settings for Okta via SAML in Codefresh
Create a SAML account for Okta in Codefresh to create an integration for Codefresh in Okta.
- In the Codefresh UI, from the toolbar click the Settings icon.
- In the sidebar, from Access & Collaboration, select Single Sign-On.
- Click Add single-sign-on, select SAML, and then click Next.
- Enter the connection details:
- Display Name: Any name you want for the integration.
- IDP Entry: Type in any character. You will enter the correct value from Okta in the final step.
- Application Certificate: You will enter the correct value from Okta in the final step.
- Provider: Leave empty.
- Click Add. The SAML integration for Okta is added and appears in the list of SSOs.
- In the Single Sign-On page, click the Edit icon for the Okta SAML integration you created.
- Copy the Assertion URL (client ID) that was automatically generated when you added the integration.
- Continue with Step 2: Configure SSO settings for Codefresh in Okta.
Step 2: Configure SSO settings for Codefresh in Okta
- Navigate to Applications.
- Select Create App Integration > SAML2.0, and click Next.
- General Settings:
- Fill in the Name and any other settings you need.
- Click Next.
- Configure SAML:
- Single Sign On URL:
- ACS URL: Enter the Assertion URL (Callback URL) generated in Codefresh.
- Audience URL:
g.codefresh.io
- Name ID Format:
EmailAddress
- Attribute Statements
- Leave Name Format as Unspecified
- firstName:
user.firstName
- lastName:
user.lastName
- email:
user.email
- Click Next.
- Feedback:
- If displayed, complete the form.
- Click Finish.
- Sign On Tab:
- Select View SAML Setup Instructions on the right.
- Keep the page open as you will need it to complete the setup for Okta in Codefresh.
- Continue with Step 3: Configure SSO settings for Codefresh in Okta.
Step 3: Complete SSO configuration for Okta in Codefresh
Complete SSO setup for Okta via SAML in Codefresh.
- IDP Entry: The IDP URL from the SSO tab in Okta.
- Application Certificate: Copy and paste the content between
-----BEGIN CERTIFICATE-----
and-----END CERTIFICATE-----
from the certificate you downloaded into the field. You can also include the BEGIN and END lines.- Note: You will get a warning when editing the Certificate section.
- Click Save.
You have completed SSO integration for OKta via SAML in Codefresh.
Test SSO connection
Now test the SSO with a test user in a different browser or private/incognito browser to make sure the integration works as it should.
- In the Codefresh UI, on the toolbar, click the Settings icon and then select Account Settings.
- From the sidebar, below Access & Collaboration, select Users & Teams.
- Locate a test user, and from the SSO list, select the integration name to enable SSO for that user.
- In a different browser or private/incognito browser window use the Corporate option to log in.
Related articles
Federated Single Sign-On (SSO) overview
Setting up SAML2 Federated SSO
Common configuration for SSO providers