Okta - SAML - Configuration
Important Note
The instructions in this article cover a third-party app and may not reflect the latest version. Please use these instructions as a guide to complete the task, but be aware that some screens, field names, and steps may have changed.
Overview
This article explains how to integrate an Okta identity provider with Flosum Cloud Apps using SAML authentication to enable Single Sign-On (SSO), allowing users to access the platform seamlessly with their existing credentials.
For more general instructions about adding an Identity Provider, see the following article.
Customer-Hosted
Customers who host Flosum Apps on their own infrastructure will have a custom URL for logging into their apps. When using this documentation, replace any Flosum Hosted URLs with your own URLs.
Configure Okta
Configure SAML Settings
Click the Single sign-on URL textbox and enter the SAML URL for your region from the table below.
United States
https://global-us.flosum.app/api/v1/saml/acs
Germany
https://global-de.flosum.app/api/v1/saml/acs
Japan
https://global-jp.flosum.app/api/v1/saml/acs
Australia
https://global-au.flosum.app/api/v1/saml/acs
Click Audience URI (SP Entity ID) and enter a unique identity for this SSO. This can be any unique string value.
Click Add identifier and enter a unique identity for this SSO. This can be any unique string value.
Click Show Advanced Settings.
Click Response and select Signed.
Click Assertion Signature and select Signed.
(Optional) The Assertion Encryption (optional) setting isn't required to work with Flosum SSO. Configure only if required by your security or compliance policies.
If required, you will need a public certificate and private key pair.
Upload the public certificate to the Encryption Certificate.
(Optional) The Signed Requests (optional) setting isn't required to work with Flosum SSO. Configure only if your security or compliance policies require signed authentication requests (AuthnRequest).
If required, you will need a public certificate and private key pair.
Enable Signed Requests
Upload the public certificate to the Signature Certificate.
Click Next.
Click Finish.
Configure Attribute Statements
Open the Sign On tab.
Scroll down to Attribute Statements.
Click Show legacy configuration.
Click Edit under Profile attribute statements.
Add the following attribute statements.
firstName
user.firstName
lastName
user.lastName
user.email
uniqueUserId
device.trusted
The uniqueUserId claim can be mapped to any user attribute that is both unique and constant.
Create Identity Provider in Global Settings
Follow the general instructions in the article below to get started creating a SAML Identity Provider.
Complete the Basic information section.
Select OPEN_ID for the identity provider Type.
Complete the Button information section.
(Optional) Complete the Group information section.
Complete SAML 2.0 Information Fields
Copy the information from your Okta application into the SAML 2.0 Information section. The first two screenshots below show which Okta application fields to copy. The table explains where to enter this information. The final screenshot shows a completed identity provider for an Okta SAML application.


Issuer
General Tab → SAML Settings → Audience Restriction
Entity ID
Sign On Tab → Settings → More details → Issuer
Click the Copy icon to copy this link.
Identity Provider Sign Certificate
Sign On Tab → Settings → More details → Signing Certificate
Click Download to download the certificate. Once downloaded, click Identity Provider Sign Certificate and upload it.
Name ID format
Leave blank
Identity Provider Login URL
Sign On Tab → Settings → More details → Sign on URL
Click the Copy icon to copy this link.

SAML Signed Request Enabled
If General Tab → SAML Settings → SAML Signed Request is Enabled:
Check the SAML Signed Request Enabled checkbox.
Complete the fields in the table below.
Auth Sign Certificate
Click to upload the public certificate that corresponds to the verification certificate.
Auth Private Key
Click to upload the private key that matches the public certificate.
Auth Private Key Password
Enter the passphrase for the private key if encrypted.
Auth Sign Algorithm
Leave blank (or specify if required).
Assertion Encryption Enabled
If General Tab → SAML Settings → Assertion Encryption is Encrypted:
Check the Assertion Encryption Enabled checkbox.
Complete the fields in the table below.
Encryption Certificate
Click to upload the public certificate that is used for assertion encryption.
Encryption Private Key
Click to upload the private key that pairs with the public certificate.
Encryption Private Key Password
Enter the passphrase for the private key if encrypted.
Save and Test
For instructions on logging in with SSO, see the following article.
Click Save to save the identity provider.
To test, open an incognito window.
Start logging in to Global Settings with your tenant name.
If the identity provider was configured successfully, you should see the SSO button you created.

Last updated
Was this helpful?