
p3zdk (p3zdk) asked a question.
Hi Okta Community, sorry this maybe a dumb question - I'm not a technician.
I have run the whole steps described in here:
https://help.okta.com/en/prod/Content/Topics/Provisioning/azure/azure-integrate-main.htm
In order to use my company's Azure AD as identity provider for my OKTA organization. I tested it with my own user and could log into my OKTA org from within the "test" button in my Azure AD environment.
But now, I don't have an idea how to make it available for the rest of eligible users in my team. In Azure AD, I added 3 other users - besides me - to the OKTA enterprise app I created in Azure AD. I expect those users should be able to go to my OKTA's SSO login page and use their Azure credentials to get logged into it, or better - if they're already logged into Microsoft 365, they should simply get into OKTA with no need to provide login (the whole idea of SSO).
Instead of the vanilla login page, I'm using the "Assertion Consumer Service URL" that looks like 'myorg.okta.com/sso/saml2/0oasgyfhq4dQXw09w4x6, and it routes the users to my Azure Login, but it takes the user back to a regular OKTA user/password screen - that, by the way, does not allow my Microsoft credentials...
Am I missing something so basic here?
I really appreciate any light you, specialists, can shed here.
Thanks in advance!
Marcio
But I

may routing rule helps.
https://help.okta.com/en/prod/Content/Topics/Security/Identity_Provider_Discovery.htm
and i am presuming you have enabled JIT settings to create user in OKTA on the fly.