This article provides a step-by-step guide to configure Okta SAML Single Sign-On (SSO) for your customer portal. It addresses common setup issues, including clarifying the correct SSO URLs and ensuring all necessary identity provider (IdP) details are correctly mapped for a seamless and secure login experience.
Implementing SAML SSO allows your users to log into the customer portal using their existing corporate credentials, eliminating the need for separate logins and improving security. A correct setup ensures a smooth authentication flow, preventing login failures and providing a consistent user experience. This guide will help you avoid common misconfigurations related to URLs and attribute mapping. 🔐
This guide walks you through configuring Okta as your Identity Provider (IdP) for SAML SSO with your customer portal. You will first set up the application in Okta and then transfer the necessary details to your customer portal's SAML configuration. 💻
Applications
Create App Integration
SAML 2.0
Next
https://sso.supportbench.net/saml/auth
EmailAddress
Okta username
Email
email
Unspecified
user.email
user_id
user.id
mail
name
user.firstName + " " + user.lastName
given_name
user.firstName
family_name
user.lastName
upn
user.login
I'm an Okta customer adding an internal app
Finish
Sign On
SAML Signing Certificates
Identity Provider metadata
-----BEGIN CERTIFICATE-----
-----END CERTIFICATE-----
Assignments
Configuration
Customer Portal
Security
SAML
Email address
Q: Why am I getting a 404 error or a "Page Not Found" when trying to log in via SAML? 🚨
A: This is typically caused by an incorrect URL. Ensure the "Single sign on URL" and "Audience URI" in your Okta application are precisely set to https://sso.supportbench.net/saml/auth. Also, verify that the "Login URL" in your customer portal matches the "Identity Provider Single Sign-On URL" from Okta's metadata. 📃
Q: My Okta configuration screen looks different from these instructions. What should I do?
A: Okta's interface can evolve. Ensure you are creating a SAML 2.0 application. If you encounter significant differences, refer to Okta's official documentation for creating a SAML app or contact Okta support for the most current steps. The core principles of setting URLs and attributes remain consistent. 📚
Q: Do I need to upload a separate "Signature Certificate"?
A: The X.509 Certificate you obtain from Okta's IdP metadata is typically used for both encryption and verifying the digital signatures of assertions sent by Okta. The "Certificate" field in your customer portal's SAML settings is where you should paste this X.509 certificate. No separate signature certificate should be required unless explicitly stated by the product. 📝
Q: My users are logging in, but their names or other details aren't mapping correctly.
A: Revisit the "Attribute Statements" section in your Okta SAML application. Ensure all the recommended attributes (email, user_id, name, etc.) are correctly defined with their corresponding user.attribute values. Also, confirm that "Username mapping" in your customer portal is set to Email address. 🔢
user.attribute
Was this article helpful?
Thank you for your feedback!
You are related to multiple companies. Please select the company you wish to login as.