Add a SAML 2.0 IdP
In addition to using Okta as an identity provider (IdP), you can also configure Okta as a service provider (SP). When Okta is used as a service provider it integrates with an external Identity Provider using SAML.
Inbound SAML allows you to set up the following scenarios.
- Your users can SSO into apps without needing an Okta password.
- You do not need to set up an Active Directory (AD) agent.
- You can connect to a partner.
- You can federate with another Identity Provider (IdP).
Typical workflow for configuring inbound SAML
Task |
Description |
---|---|
Add a SAML Identity Provider | Add a SAML 2.0 IdP and configure its authentication, JIT, and SAML protocol settings. |
Add metadata for an Identity Provider | Add metadata to an existing IdP and generate its configuration data for the Security Provider. |
(Optional) Configure Universal Directory mappings | Add or edit attributes and customize the mapping between the IdP and Okta. |
(Optional) Specify an error page for Identity Provider, SAML, or SSO | Redirect users to a custom error page if Okta fails to process the IdP sign-in attempt. |
The System Log provides information about the Inbound SAML events that occur in the system. This information can be useful for debugging your configuration.