Enable Single Sign-On (SSO) with Okta (SAML 2.0)
This guide explains how to configure Single Sign-On (SSO) between Okta and the Contify platform using the SAML 2.0 protocol.
With this integration, users can log in to Contify using their Okta credentials.
Systems Involved
Client
Identity Provider (Okta)
Service Provider (Contify)
Prerequisites
An active Okta account
Administrator access to Okta
Setup in Okta
Create Contify Application in Okta
Sign in to: https://login.okta.com/
Open the Okta Admin Portal
From the left navigation, select Applications
Click Applications, then click Create App Integration
Select SAML 2.0 as the sign-in method and click Next
Enter Contify as the App Name and click Next
Configure SAML Settings
Add the following details:
Single Sign-On URL:
Provided by Contify in the format:
βhttps://auth.contify.com/realms/xxxxxxxx/broker/saml/endpointAudience URI (SP Entity ID):
Same as the above URLName ID format: EmailAddress
Application username: Email
Click Next
Complete Application Setup
Select This is an internal app that we have created and click Finish
Share Metadata URL
Copy the SAML 2.0 Metadata URL and share it with Contify
Configure Authentication Policy
Under User Authentication, select:
Authentication policy: Okta Agent Registration
Click Save
Add and Assign Users
Go to the Import section under the Contify application
Click Import from CSV
Download the CSV template
Add users who need access
Upload the CSV and click Import Users
Select users and Confirm assignments
Enable Self-Service Access
Go to the Assignments section under the Contify application
Edit Self Service
Enable Allow users to request app
Save the changes
Testing
UAT (User Acceptance Testing)
Contify will provide a UAT environment and configure the application with test data
Client needs to provide a few user IDs for testing
Testing will be done collaboratively for sign-off
Production
Contify and the client will configure their respective systems
After release, sanity testing will be done with a few active users
Once validated, SSO will be rolled out to all users
