Okta Mobile Connect Skip to main content
https://support.okta.com/help/oktaarticledetailpage?childcateg=&id=ka02a0000005uifsaq&source=documentation&refurl=http%3a%2f%2fsupport.okta.com%2fhelp%2fdocumentation%2fknowledge_article%2fokta-mobile-connect-264896633
How satisfied are you with the Okta Help Center?
Thank you for your feedback!
How satisfied are you with the Okta Help Center?
1
2
3
4
5
Very Dissatisfied
Very satisfied
Enter content less than 200 characters.
Average Rating:
Okta Mobile Connect
Published: Jan 31, 2018   -   Updated: May 15, 2018

okta-doc-source

Okta Mobile Connect

Okta Mobile Connect (OMC) provides single sign-on (SSO) capability to SAML-enabled native mobile applications on iOS devices with Okta Mobile installed. It allows end users with an active Okta Mobile session to access any SAML-enabled mobile app from their iOS device simply by entering an email address or company domain.


Caveats
  • OMC currently is only supported on iOS devices with Okta Mobile installed.
  • OMC currently enables SSO only on Box and Workday SAML-enabled iOS mobile apps.
  • OMC is included with Okta’s SSO product but not enabled by default. To use OMC, you do not need to purchase Okta Mobility Management (OMM), but you do need to have Okta Support specifically enable Mobile SSO for your org, even if you have OMM.
  • See this Known Issue about OMC: Apple iOS update causes failure in Okta Mobile Connect.

Configure OMC for Box

If you have not already added a SAML-enabled Box app to your org, start at the beginning of this procedure. If you already have a SAML-enabled Box app in your org but have not deployed it to your users, start at Step 8.

  1. From the Okta Admin Dashboard, go to Applications.
  2. Click Add Application, search for Box, and then click Add.
  3. Configure settings in General Settings and then click Next.
  4. In Sign-On Options, select SAML 2.0.
  5. (Optional) Specify the Default Relay State The optional Default Relay State is the page your users land on after they successfully log in..
  6. Click View Setup Instructions and follow the steps to configure IdP-initiated and SP-initiated SSO.
  7. Return to Sign-On Options in Okta and configure remaining settings, and then click Done.
  8. Go to the Mobile tab and click the pencil icon for either Box for EMM - iOS or Box for iPhone and iPad.
  9. Configure settings, making sure in the Deploy section to select Make this app available to users.
  10. Note: This setting enables one or both of the following functionalities:

    • Okta Mobile Connect — SSO for SAML-enabled iOS mobile apps.
    • Provisioning mobile apps for OMM (if your org uses OMM).
  11. Click Save.
Configure OMC for Workday

If you have not already added a SAML-enabled Workday app to your org, start at the beginning of this procedure. If you already have a SAML-enabled Workday app in your org but have not deployed it to your users, start at Step 10.

  1. From the Okta Admin Dashboard, go to Applications.
  2. Click Add Application, search for Workday, and then click Add.
  3. In General Settings, make sure to enter a SAML URL format in the Your Workday site URL.
  4. Configure remaining General Settings, then click Next.
  5. In Sign-On Options, select SAML 2.0.
  6. (Optional) Specify the Default Relay State The optional Default Relay State is the page your users land on after they successfully log in..
  7. (Optional) Select Enable Single Logout.
  8. Click View Setup Instructions and follow the steps to configure IdP-initiated and SP-initiated SSO.
  9. Return to Sign-On Options in Okta, configure remaining settings, and then click Done.
  10. Go to the Mobile tab and click the pencil icon for Workday iOS app.
  11. Configure settings, making sure in the Deploy section to select Make this app available to users.
  12. Note: This setting enables one or both of the following functionalities:

    • Okta Mobile Connect — SSO for SAML-enabled iOS mobile apps.
    • Provisioning mobile apps for OMM (if your org uses OMM).
  13. Click Save.

Post a Comment