Okta

circle-check

Single Sign-On (SSO) is an authentication process that allows users to access multiple applications or systems with one set of login credentials. In this article, we will cover how to configure SSO using the SAML 2.0 standard protocol with Okta.


Retrieve SSO SAML identifiers

To start, your organization needs to retrieve the SSO SAML identifiers from the Didomi console to continue setup in your identity provider.

Click My organization and selecting Single Sign-on from the drop-down menu.

Use the provided fields in the Get your SSO SAML identifiers step to record the following:

Identifier
Description

Configured issuer

Your organization's identity provider's unique identifier within the Didomi console.

Login URL

Where user will be redirected after successful login on the identity provider.

Click Continue when finished.

Configure Didomi console integration in Okta

Before configuring SSO your organization will need to add a Didomi console integration in your Okta account. From the Admin console of your Okta account:

  1. Navigate to Applications > Applications.

  2. Click on Create App Integration.

  3. Select SAML 2.0 in the Sign-in method.

  4. Click Next.

  5. In App name, enter a name your new application that is recognizable as being for the Didomi console (e.g. Didomi Console). This is where your organization will configure the SSO SAML.

Navigate to the Configure SAML section and enter the SSO SAML identifiers retrieved from the Didomi console in the appropriate fields:

Okta SAML setting
Didomi console SSO SAML identifier

Single sign-on URL

Login URL

Audience URI (SP Entity ID)

Configured issuer

Next, navigate to your integration's attribute statementsarrow-up-right and configure the following:

circle-exclamation

Name

http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress

Name format

URI Reference

Value

user.email

Continue with the configuration flow to create the Didomi console integration within Okta.

Retrieve Didomi console integration metadata from Okta

When the Didomi console integration is created within Okta, navigate to the application from the Okta Admin console and click the Sign On tab. Record the values for the following fields (collectively Didomi refers to these values as metadata):

  • Sign-On URL

  • Issuer

  • Signing Certificate

Add Okta metadata

With the metadata from Okta copied, navigate back to the SSO configuration within the Didomi console and input those values in the provided fields for the Setup SSO settings step.

Didomi Metadata
Okta values

X509 certificate

Signing Certificate

Login URL

Sign-On URL

Logout URL

Issuer

Test and complete SSO configuration

Didomi will verify the identity provider metadata. When successful, utilize the Domain(s) field to add email domains to which the SAML authentication will be restricted (i.e. only users whose emails have this domain will be allowed to login with SSO SAML).

circle-exclamation

Click Save settings.

Assign user access

Once the Didomi console SSO configuration is finished, your organization can manage a user's access to the Didomi console from the Okta Admin portal. Navigate to the Didomi console integration:

  1. Click Assignments

  2. Click Assign > Assign to people

Follow Okta instructions to assign user access.

Last updated