Skip to main content

Configure Single Sign-On (SSO) with Okta (SAML)

Jetmir Abdija avatar
Written by Jetmir Abdija
Updated over 2 weeks ago

On this page we provide the steps to help you configure Single Sign-On (SSO) with an Okta account.

1. To initialize the configuration process, open a support ticket with the BlueDolphin support team and provide the following details:

  • A logo in .png format, or vector or high-resolution images without any whitespace around it, is recommended.
    (makes it easier to distinguish SSO from other types of authentication)

2. To access the SAML app integration wizard, go to Applications > Applications and click Create App Integration.

SSO_for_Okta_step_1.png

3. Select SAML 2.0 for the sign-in method and click Next.

SSO_for_Okta_step_2.png

4. Type in the name for your new application and click Next.

SSO_for_Okta_step_3.png

5. In the Configure SAML view, type in the following values:

For EU tenants:

  • Single sign-on URL

  • Audience URI (SP Entity ID)

For US tenants:

  • Single sign-on URL

  • Audience URI (SP Entity ID)

SSO_for_Okta_step_4.png

Click Next.

6. The format of the metadata URL is the following:

where

Your Okta account is visible in the browser URL (the important part comes before -admin.okta.com).

SSO_for_Okta_step_5.png

Your application ID is visible in the Configure SAML view under <> Preview the SAML Assertion.

SSO_for_Okta_step_6.png

After clicking the button, you will see the XML that contains your application ID.

SSO_for_Okta_step_7.png

7. In Attribute Statements (optional), add the missing claim with the values below and save changes.

  • Name: Email

  • Value: user.email

SSO_for_Okta_step_10.png

NOTE: An SSO application should not be linked to the users directly. Instead, create a bookmark application in Okta and link it to the the BlueDolphin URL of your organization https://bluedolphin.app/{companyname}.

Did this answer your question?