Okta SAML

If your organization uses Okta Identity Provider (IdP) for user authentication, you can configure IQNECT to allow your users to log in using their IdP credentials. Note that both SAML 2.0 and OIDC protocols are supported when using OKTA as an IdP. This page is specific to SAML 2.0. For OIDC, go to Okta OIDC.

Okta integration only supports Service Provider initiated logins.

In Okta, create a SAML Application with the settings below. See the Okta documentation for help.

Setting Value
Single Sign on URL    https://api.iqnect.ai/sso/callback/saml  
Audience URI (SP Entity ID)    https://api.iqnect.ai  

Detailed instructions are available below.


1. Creating an application


2. Okta app configuration

Once the application is created, the following optional adjustments can be done.

  1. Assign users or groups to IQNECT
  2. Configure mappings to account for the attributes required in Introduction. The following claims should be mapped into: displayName   , email,  and identifier   . See an example of how this should look


3. Send information to IQNOX

The following information needs to get to IQNOX so the tenant SSO to be configured

  1. Metadata XML url: https://<OKTA_TENANT>.okta.com/app/<APP_ID>/sso/saml/metadata   
Did this answer your question? Thanks for the feedback There was a problem submitting your feedback. Please try again later.

Still need help? Contact Us Contact Us