This article provides the steps to configure a functional Slack integration that uses another User.Email attribute value than the one preconfigured within the Slack App Catalog (which are the Email and Username).
- Custom Security Assertion Markup Language(SAML)
- Single Sign-On (SSO)
The User.Email attribute is required for authentication, and if the Username Format in Okta does not match the User.Email value, duplicate accounts will be created through Just In Time (JIT) provisioning. The Okta Integration Network (OIN) Slack integration has two preconfigured values ("Email" and "Username") and does not offer a Custom option for customers who would like to have end users authenticate with an alternative value (for example, Secondary Email).
For the authentication to work with a value other than Email and Username, a Custom SAML integration in Okta must be configured.
- In Okta, go to Applications > Applications > Create App Integration > SAML 2.0.
- Follow the steps provided by Slack to integrate the Custom SAML app in Okta.
- See Custom SAML single sign-on and add the necessary URLs in Okta.
- The Username Format within the Okta Custom Slack needs to match the same value as the
User.Emailattribute will have (for example,user.secondEmail). - Attribute Statements must be added in the Okta configuration. For the Name field, add
User.Email, and for the Value field, add the attribute required for authenticating (for example,user.secondEmail). - Follow the guide from Okta's side of the Custom Slack integration > Sign On > View SAML setup instructions, and take the Identity Provider Single Sign-On URL to add it in Slack for SAML 2.0 Endpoint URL(HTTP). Take the Identity Provider Issuer from Okta and add it to the Identity Provider Issuer in Slack. Copy the X.509 Certificate and paste it into the Public Certificate field in Slack.
The authentication should now be successful through the Custom SAML integration. If SCIM Provisioning is needed:
- In Okta, from the Custom SAML app that was integrated, go to General > Provisioning > check SCIM.
- Follow the steps outlined in the following Slack article to set up everything there: Provisioning with SCIM.
- In Okta, the SCIM connector base URL is
https://api.slack.com/scim/v2/. For Authentication Mode, select HTTP Header and add the token generated in Slack > Test Connector Configuration. Then Save.
NOTE: If the Connector Configuration fails to test, save the configuration with dummy OAuth 2 values and then return to configuring the "HTTP Header" again.
