Configuring Apteligent with Okta

  1. Configure OKTA
  2. Configure Apteligent Okta
  3. Finish Okta setup
  4. Test the Configuration Okta

Setting up a SAML application in Okta

Step 1: Configure Okta

  1. Navigate to Admin > Applications > Applications > Add Application
../_images/saml-okta-step-1-admin-application.png
  1. Click the Create New App button
../_images/saml-okta-step-1-create-new-app.png
  1. The first step is what your users will see in Okta.
../_images/saml-okta-step-1-general-settings.png
  1. Click next
  2. Populate the fields in the template using the values below
../_images/saml-okta-step-1-saml-settings.png
  1. Add the following Attribute Statements
  • Name: email
Value: ${user.email}
  • Name: firstName
Value: ${user.firstName}
  • Name: lastName
Value: ${user.lastName}
  • optional attributes:
    • if you would like Apteligent to add new account members to all apps on all accounts, pass the following attribute. Otherwise, new members will see a read-only view of your account(s), and have access to no apps. You can then invite them to only the apps they need to see via our invite flow.
    • Name: autoAssign
    Value: True
    
../_images/saml-okta-step-1-attribute-statements.png
  1. Click Next
  2. Are you an Okta customer or an Okta software vendor/partner? Click as appropriate.
../_images/saml-okta-step-1-setup-step-3.png
  1. Click the View setup instructions button.
../_images/saml-okta-step-1-view-setup-instructions.png
  1. Scroll to the botton of this page to the optional section. Copy and save all of the Identity Provider Metadata as an .xml file.
../_images/saml-okta-step-1-idp-metadata.png

Step 2: Configure Apteligent

Note

CAUTION: Once you enable SAML SSO, you will only be able to access this account via your identity provider.

Please make sure that the email address you use to log into Apteligent is the same email address as the one you use for your identity provider.

Watch this 2 minute video for an example of setting up SAML single sign-on.

  1. Navigate to Account Management > Single Sign-On

Note

You will only be able to access this tab if you are the account owner.

  1. Enter Your Identity Provider name.

Note

This will be seen by all users of this Identity Provider.

This name must be between 8 and 64 characters long, start with a letter, and only include letters, numbers, spaces, dashes, and underscores.

This name will need to be part of the Single Sign-On URL you set up with your identity provider.

Example Identity Provider name: Your Identity Provider

Example Single Sign-On URL: https://app.crittercism.com/saml/sso/your-identity-provider

  1. Drag and drop the .xml file you saved from your Identity Provider here.
  2. Click Save Settings
../_images/saml-step-2-configure-crittercism.png
  1. Copy the end of the url in the box on the next screen
(e.g. example-identity-provider-name)
../_images/saml-step-2-url-ending.png

Step 3: Finish Okta Setup

  1. Back in your Okta account, click the General tab
  2. Click Edit in SAML Settings
  3. Click Next
  4. Paste the end of the url you copied from Apteligent onto the end of the url in Single sign on URL and Audience URI (SP Entity ID)
../_images/saml-okta-step-3-finish-setup.png
  1. Click Next
  2. Click Finish
  3. Click the People tab
  4. Click Assign to People, assign the app to the appropriate users (including yourself), click Done

Step 4: Test the Configuration

  1. From the Okta Admin screen, click My Applications
  2. Click on the link to your newly added app.
../_images/saml-okta-step-4-new-app.png