Okta as a SAML Identity Provider
To add Okta as a SAML 2.0 external integration, you must create a SAML-enabled application in your Okta organization. This setup establishes trust between Okta and the Conga Advantage Platform, enabling users to authenticate through Okta using single sign-on (SSO).
In this configuration, Okta acts as the Identity Provider (IdP), and Conga Advantage Platform functions as the Service Provider (SP). The Conga Advantage Platform also supports IdP-initiated flow.
After setting up the application, you must collect key integration details such as the external_organization_id
, Metadata Location URL, and the claim type that represents the organization ID. These values are essential for completing the integration in the Conga platform.
Integrating Okta as a SAML IdP supports secure and centralized identity management, allowing seamless access to Conga services using enterprise credentials.
Step 1: Create an app in Okta
- Log in to Okta.
- In the Admin Console, go to Applications > Applications.
- Click Create App Integration.
- Select SAML 2.0 as the sign-in method.
- Click Next.
- Provide the general information for the integration and then click Next.
- In the General section, enter and select details for the following:
- In the Advanced Settings section, configure the following details:
- Click Save.
Step 2: Get the external_organization_id, Metadata Location URL, and Organization ID Claim Type details
Step 3: Add Okta as an external integration
Users should only use the IDP-initiated flow to log in to the platform after they have been explicitly onboarded through the Platform Admin Console.
-
Click the More (
) icon and select Edit.
-
Update the Choose IDP Metadata Setup, External Organization ID, Type, Description, Email Domain, Display Name, and Default IDP fields per your business needs.
Note: You should change the External Organization ID if the Single Sign-On (SSO) external ID changes.