1. Prerequisites:
– You need an active license for Identity Authentication.
– Ensure that you have the necessary authorizations (e.g., “Manage Applications” and “Manage Corporate Identity Providers”) assigned to your Identity Authentication account.
– Access the Okta Admin portal.
2. Create a SAML 2.0 Application in Okta:
– Log in to the Okta admin portal.
– Click on “Use single sign-on” > “Add App.”
– Choose “Web” as the platform and “SAML 2.0” as the sign-on method.
– Define a custom application name, logo, and visibility.
– Follow the official Okta documentation to configure the application.
3. Configure SAML Integration in Okta:
– Obtain the following values from Identity Authentication:
– Single sign-on URL (ACS endpoint): This URL is obtained from the IAS Administration Console.
– Audience URI (SP Entity ID): This should match the “Name” value of your IAS tenant.
– Construct the ACS endpoint URL for SP-initiated SSO or IdP-initiated SSO.
– Set both URLs in Okta.
– Ensure the audience matches exactly as described in KBA 2693814.
That’s a high-level overview! For detailed steps and screenshots, refer to the original blog post. Feel free to ask if you need further clarification or additional information!