Skip to main content

Configure Single Sign-On (SSO) with Okta (SAML)

Jetmir Abdija avatar
Written by Jetmir Abdija
Updated over a week ago

On this page we provide the steps to help you configure Single Sign-On (SSO) with an Okta account.

1. To initialize the configuration process, open a support ticket with the BlueDolphin support team and provide the following details:

  • Logo in .png format (makes it easier to distinguish SSO from other types of authentication)

2. To access the SAML app integration wizard, go to Applications > Applications and click Create App Integration.

SSO_for_Okta_step_1.png

3. Select SAML 2.0 for the sign-in method and click Next.

SSO_for_Okta_step_2.png

4. Type in the name for your new application and click Next.

SSO_for_Okta_step_3.png

5. In the Configure SAML view, type in the following values:

For EU tenants:

  • Single sign-on URL

  • Audience URI (SP Entity ID)

For US tenants:

  • Single sign-on URL

  • Audience URI (SP Entity ID)

SSO_for_Okta_step_4.png

Click Next.

6. The format of the metadata URL is the following:

where

Your Okta account is visible in the browser URL (the important part comes before -admin.okta.com).

SSO_for_Okta_step_5.png

Your application ID is visible in the Configure SAML view under <> Preview the SAML Assertion.

SSO_for_Okta_step_6.png

After clicking the button, you will see the XML that contains your application ID.

SSO_for_Okta_step_7.png

7. In Attribute Statements (optional), add the missing claim with the values below and save changes.

  • Name: Email

  • Value: user.email

SSO_for_Okta_step_10.png

NOTE: An SSO application should not be linked to the users directly. Instead, create a bookmark application in Okta and link it to the the BlueDolphin URL of your organization https://bluedolphin.app/{companyname}.

Did this answer your question?