Skip to content
Snippets Groups Projects
Commit 766d2ffc authored by Cynthia Ng's avatar Cynthia Ng Committed by Mike Jang
Browse files

Docs: Update Okta Group SAML info

parent ac577f01
No related branches found
No related tags found
No related merge requests found
Loading
Loading
@@ -38,6 +38,24 @@ SCIM mapping:
 
![Azure AD SCIM](img/AzureAD-scim_attribute_mapping.png)
 
## Okta
Basic SAML app configuration:
![Okta basic SAML](img/Okta-SAMLsetup.png)
User claims and attributes:
![Okta Attributes](img/Okta-attributes.png)
Advanced SAML app settings (defaults):
![Okta Advanced Settings](img/Okta-advancedsettings.png)
IdP Links and Certificate:
![Okta Links and Certificate](img/Okta-linkscert.png)
## OneLogin
 
Application details:
Loading
Loading
doc/administration/troubleshooting/img/Okta-SAMLsetup.png

52.6 KiB

doc/administration/troubleshooting/img/Okta-advancedsettings.png

46.5 KiB

doc/administration/troubleshooting/img/Okta-attributes.png

21.7 KiB

doc/administration/troubleshooting/img/Okta-linkscert.png

155 KiB

Loading
Loading
@@ -234,6 +234,13 @@ Set other user attributes and claims according to the [assertions table](#assert
 
Under Okta's **Single sign on URL** field, check the option **Use this for Recipient URL and Destination URL**.
 
Please note that Okta's generic SAML app does not have a **Login URL** field, where the **Identity provider single sign on URL** would normally go. The **Identity provider single sign on URL** may be required the first time a user is logging in if they are having any difficulties.
We recommend:
- **Application username** (NameID) set to **Custom** `user.getInternalProperty("id")`.
- **Name ID Format** set to **Persistent**.
Set attribute statements according to the [assertions table](#assertions).
 
### OneLogin setup notes
Loading
Loading
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment