<iframe src="https://www.googletagmanager.com/ns.html?id=GTM-M74D8PB" height="0" width="0" style="display:none;visibility:hidden">
Loading
Skip to NavigationSkip to Main Content
How to Configure the NeoGov Application in Okta Using SAML
Single Sign-On
Integrations
Okta Classic Engine
Overview

This article describes how to configure the NeoGov application in Okta using Security Assertion Markup Language (SAML).

Applies To
  • Custom SAML app
  • SAML 2.0
  • NeoGov
  • Okta Classic Engine
Solution

NOTE: The configuration presented below applies only to NeoGov production instances.

  1. Please follow the instructions on how to configure a Custom SAML app in Okta.
  2. Uncheck the Use this for Recipient URL and Destination URL, and populate the following URLs:
  3. Set the NameID format to Persistent and the Application username to Okta username, then assign the application to the user account/accounts. 

General SAML Settings 

  1. Ensure that the username set in the NeoGov assignment in Okta matches the one configured on NeoGov's side.
  2. The metadata can be retrieved by navigating to the NeoGov app in Okta and clicking the Identity Provider metadata link located under the Sign On tab. Afterward, send the information to the Service Provider's Support Team.
 
Loading
How to Configure the NeoGov Application in Okta Using SAML