<iframe src="https://www.googletagmanager.com/ns.html?id=GTM-M74D8PB" height="0" width="0" style="display:none;visibility:hidden">
Loading
Skip to NavigationSkip to Main Content
Setting Up Okta Orgs as SAML IDP and SAML SP for Dynamic ACS URL Support
Single Sign-On
Okta Classic Engine
Okta Identity Engine
Overview

This article provides step-by-step instructions for setting up Security Assertion Markup Language (SAML) app integrations between two Okta orgs.

Applies To
  • SAML app integrations between two Okta orgs
  • Service Provider (SP)
  • Identity Provider (IdP)
Cause

To enable single sign-on (SSO) functionality, SAML app integrations between two Okta orgs need to be set up.

Solution
  1. Set up External IdP in SP Org

To set up an External IdP in the SP org, follow these steps:

  1. Go to SecurityIdentity Providers > Add Identity Provider Add SAML 2.0 IdP.

SAML option

  1. Enter a name for the IdP and set "IdP Username" to be idpuser.subjectNameid.

idpuser.subjectNameid

  1. Select Create New User (JIT) to create IdP's user profile in the SP org after successful authentication.

Create New User (JIT)

  1. Use an IdP Signature Certificate example to ensure the external IdP has been created successfully.

    •  okta-certificate-example.crt

IdP Signature Certificate

  1. Save the settings for now. Get the Assertion Consumer Service URL and Audience URI, which will be used in the next step.

IdP Configuration

 

  1. Set up an SP App in the IdP Org

  1. Go to Applications > Add Application Create New App Select SAML 2.0 > and Create.
  2. Set the app name, and click Next.

Create new app intergation

  1. Set the Assertion Consumer Service URL from the SP org's external IdP as the Single Sign-On URL, and check the box Use this for Recipient URL and Destination URL.

Single Sign-On URL

  1. Set the Audience URI from the SP org's external IdP to the Audience URI in the app. Keep the rest of the settings as such.

Audience URI

  1. Scroll down to ATTRIBUTE STATEMENTS (OPTIONAL) and set the following attributes to be passed in the SAML response.

ATTRIBUTE STATEMENTS (OPTIONAL)

  1. If using the Dynamic ACS URL feature, which uses signed SAML Request, check Validate SAML requests with signature certificates. The certificate update will occur later.

Validate SAML requests with signature certificates

  1. Keep the default settings and click Finish. Make sure to assign the app to a certain user.

Assign app to user

  1. Under Sign On, in the bottom right corner, see View SAML Setup Instructions. Single Sign-On using SAML will not work until an app is configured to trust Okta as an IdP.

View SAML Setup Instructions

  1. From the SAML Instruction, two values are needed to update the IdP in the SP org in the first step: Identity Provider Single Sign-On URL and Identity Provider Issuer.

Identity Provider Single Sign-On URL and Identity Provider Issuer

 

  1. Finish Setting up External IdP in SP Org

To complete the setup of the external IdP in the SP org, follow these steps:

  1. Go to SecurityIdentity Providers Configure Identity Provider created earlier.

Configure IdP

  1. Copy the values of Identity Provider Single Sign-On URL and Identity Provider Issuer, and paste them to SAML Protocol Settings: IdP Issuer URI and IdP Single Sign-On URL.

SAML Protocol Settings

 

  1. Set up Certificate

To set up the certificate, follow these steps:

  1. Download the certificate from the IdP org, and convert the .crt file to .pem file using the following command: 

    openssl x509 -in example.cert -out example.pem -outform PEM.

Download Certificate

  1. Upload the .pem file to the SP org: SAML Protocol Settings.

SAML Protocol Settings

  1. Download the certificate from the SP org and convert the .crt file to .pem file using the following command: 

    openssl x509 -in example.cert -out example.pem -outform PEM
    

Download Certificate

  1. Upload the .pem file to the IdP org SAML Config > settings > under the Show Advanced link.

Signature Certificate

 

 

Loading
Setting Up Okta Orgs as SAML IDP and SAML SP for Dynamic ACS URL Support