<iframe src="https://www.googletagmanager.com/ns.html?id=GTM-M74D8PB" height="0" width="0" style="display:none;visibility:hidden">
Loading
Skip to NavigationSkip to Main Content
How to Ensure Application Context is Passed to an External Identity Provider
Single Sign-On
Okta Classic Engine
Okta Identity Engine
Overview

This article explains why the Application Context is not being sent to an external identity provider (IdP).

Applies To
  • Inbound Security Assertion Markup Language (SAML)
  • Application Context
Cause

The issue occurs because the necessary feature for sending the Application Context is not enabled, or the checkbox controlling this functionality is not selected. 

Solution

The solution requires enabling the appropriate feature or configuration option within the Okta Admin Console to ensure Application Context is included in the authentication request sent to the external Identity Provider. 

 

Ensure that the following feature is enabled:

  1. Log in to the Okta Admin Console.
  2. Navigate to Settings > Features.
  3. Locate the Send Application Context to an External IdP feature.
  4. Click the toggle or checkbox to enable the feature.

feature 

 

Ensure the configuration option is enabled:

  1. Log in to the Okta Admin Console.
  2. Navigate to Security > Identity Providers > [Desired IdP] > Actions > Configure Identity Provider.
  3. Select Edit.
  4. Select the check box for Send Okta application context under SAML Protocol Settings > Application context.

feature

 

 

Loading
How to Ensure Application Context is Passed to an External Identity Provider