Configure Single Sign-On options | Okta (2024)

The options available when setting up or changing the Single Sign-On (SSO) method for an app integration depend on the access protocols supported by the app integration.

About admin roles for this task

The administrator running this task must be a super admin for the Okta org.

App administrators can configure user access to app integrations for which they're responsible.

Before you begin

The admin must be signed in to the Okta Admin Console.

Configure Sign-on options

Whether you're configuring an app integration for the first time or you later need to change these options, the Sign on methods available depend on the access protocols supported by the app integration.

OpenID Connect

For OpenID Connect (OIDC) app integrations, Okta uses the OAuth 2.0 protocol to exchange user credentials and enable SSO. OIDC app integrations typically have a link to instructions that guide you through the configuration.

SAML 2.0, WS-Federation

If you select one of SAML 2.0 or WS-Federation, Okta applies a federated approach to user authentication. App integrations configured using these methods typically have a link to instructions that guide you through the configuration.

For SAML applications, the Metadata details section includes data that your application integration may require. This can include Metadata URL, Sign on URL, and so on. See the linked instructions (View Setup Instructions) for details.

Bookmark-only

The Bookmark-only sign-in option is the simplest mode supported for an app integration. When the end user launches the app integration, Okta opens the sign-in page for the external application, but doesn't perform SSO. No username or password information is passed to the external application, so no configuration is required.

No Sign On

The No Sign On sign-in option is available when adding or configuring mobile apps or applications that don't require any sign-in information.

Secure Web Authentication

For the Secure Web Authentication (SWA) sign-in option, Okta signs in to the external application for each user. Selecting this method doesn't prevent users from signing in to the external application directly. You can set up your app integration with any of the following SWA sign-in configurations:

  • User sets username and password
  • Administrator sets username and password
  • Administrator sets username, user sets password
  • Administrator sets username, password is the same as user's Okta password
  • Users share a single username and password set by administrator

User sets username and password

This option allows your users to choose their usernames and passwords.

Note the following about this option:

  • If users are unassigned from the app integration and then later reassigned, they must reenter their usernames and passwords. Users can be unassigned from an app integration in the following ways:
    • The user is deactivated in Okta.
    • The user is removed from a group assigned to the app integration.
    • The user no longer appears in imports after being deactivated in the external application.
    • The organizational unit (OU) that contains the user is deselected.

Administrator sets username and password

This option provides the most robust level of admin control. It allows the admin to set all usernames and passwords for an app integration, after which the credentials are never shared with the end users. This option provides a way to shut off user access to the credentials of sensitive applications. You must ensure that the user doesn't have an alternative way to reset their password for the external application. It's also helpful in cases where admins must supply a new, obfuscated password to an Okta user, as no active communication with the user is required.

To set the usernames and passwords for a particular SWA app integration, do the following:

  1. Outside of Okta, access the external application you want to assign.
  2. Establish the usernames and passwords within the application.
  3. Return to Okta and access or create the app integration in the OIN.
  4. Choose the Sign On tab (or step) for the app integration.
  5. Choose Administrator sets username and password, and then click Next.
  6. Assign the app integration to users and then assign their usernames and passwords.

Note the following about this option:

  • The admin-created password can only be viewed when initially created. After setting the password, it's no longer visible to the admin. To change the password, first reset it in the external application, and then reset it in Okta.
  • If the chosen app integration was previously assigned to an established Okta group and then is modified to support this sign-on method, the admin needs to manually update the usernames and passwords for each group member.
  • The Password reveal feature is disabled when this option is selected because end users don't have access to their passwords.

Administrator sets username, user sets password

This option allows the admin to set up the external application accounts on behalf of your users, while still allowing users to set and change their application password (which is separate from their Okta password).

  1. Outside of Okta, access the external application you want to assign.
  2. Establish the username for each user within the application.
  3. Return to Okta and access or create the app integration in the OIN.
  4. Choose the Sign On tab (or step) for the app integration.
  5. Choose Administrator sets username, user sets password, and then click Next.
  6. Assign the app integration to users.

Administrator sets username, password is the same as user's Okta password

This option allows the admin to set up the external application accounts on behalf of your users and use their existing Okta passwords. For this to work, the admin needs to add the user accounts in the external application and then associate the usernames through provisioning integration with Okta. After you configure this option, end users can access the app integration without being prompted for a username or password.

  1. Outside of Okta, access the external application you want to assign.
  2. Establish the username and password for each user within the application.
  3. Return to Okta and access or create the app integration in the OIN.
  4. Choose the Sign On tab (or step) for the app integration.
  5. Choose Administrator sets username, password is the same as user's Okta password, and then click Next.
  6. Assign the app integration to users.

Users share a single username and password set by administrator

Select this option if you share a single application license or a single application account with multiple people in your organization.

To set the shared credentials for a shared application, do the following:

  1. Outside of Okta, access the external application you want to assign.
  2. Establish the username and password within the application.
  3. Return to Okta and access or create the app integration in the OIN.
  4. Choose the Sign On tab (or step) for the app integration.
  5. Choose Users share a single username and password set by the administrator, and then click Next.
  6. Assign the app integration to users.

You can enable the Password reveal feature when this option is selected, but it only allows admins to see the shared password. End users can't reveal shared passwords.

See also

Add existing app integrations

Create custom app integrations

Configure settings for app integrations

Configure Single Sign-On options | Okta (2024)

FAQs

Configure Single Sign-On options | Okta? ›

Single sign-on (SSO) is an identification method that enables users to log in to multiple applications and websites with one set of credentials. SSO streamlines the authentication process for users.

What is single sign-on configuration? ›

Single sign-on (SSO) is an identification method that enables users to log in to multiple applications and websites with one set of credentials. SSO streamlines the authentication process for users.

How do you program a single sign-on? ›

Implementing SSO In 5 Steps
  1. Map Out The Applications You Want to Connect to SSO. Identify which applications should be part of your SSO structure. ...
  2. Integrate With Identity Provider (IdP) ...
  3. Verify The Data in Your Identity Directory. ...
  4. Evaluate User Privileges. ...
  5. Ensure The SSO System is Highly Available Secure.

What are the different types of SSO integrations with Okta? ›

The integrations in the OIN can use OpenID Connect (OIDC), SAML, SWA, or proprietary APIs for SSO. Okta maintains the SSO protocols and provisioning APIs. Okta also provides integrations for SSO to on-premises web-based applications. You can integrate on-premises applications using SWA or SAML toolkits.

How to configure Okta SSO? ›

Set up SSO with Okta
  1. Create SSO Name and ACS URL in Contentstack.
  2. Configure Contentstack App in Okta.
  3. Configure Okta details in Contentstack.
  4. Manage users access control in Okta. Add application to users. Add application to user groups for IdP Role Mapping.
  5. Create Role Mappings in Contentstack.
  6. Test and Enable SSO.

Should I use single sign-on? ›

SSO improves usability for employees

Single sign-on reduces that cognitive burden. Signing in once also saves time, thus improving employee productivity. Given that 68% of employees switch between ten apps every hour, eliminating multiple logins can save a company considerable time and money.

What happens if single sign-on is enabled? ›

If single sign-on is enabled, it is strongly recommended that SSL communication be configured for the repository. Desktop client applications, such as Deployment Manager, create a Java subject and then establishes a GSS session with the repository using the subject context.

Is setting up SSO hard? ›

Connecting users to apps through legacy SSO solutions is difficult, requiring updated user stores, firewall changes, and additional hardware.

When not to use SSO? ›

Creates a single point of failure

If the SSO system is not properly maintained, threat actors can potentially compromise it and gain access to multiple services at once. Additionally, if the SSO system experiences downtime, users may not be able to log into any dependent applications or services.

What is the basics of SSO? ›

Single sign-on (SSO) is a technology which combines several different application login screens into one. With SSO, a user only has to enter their login credentials (username, password, etc.) one time on a single page to access all of their SaaS applications.

What is the difference between Okta and SSO? ›

Google SSO leverages your employees' workspace identities for authentication and authorization. With Okta, you can choose to use its universal directory to store and manage identities or draw from your existing directory (that is,Google Workspace or Microsoft AD).

What is the difference between authentication and SSO? ›

SSO is a subset of federated identity management. In practice, federated authentication and SSO are more similar than they are different. Both allow end users to access multiple accounts and platforms by logging in once. The main difference is in how each system achieves that end.

How do I set up SSO authentication? ›

Configure the SSO profile for your organization
  1. Sign in to your Google Admin console. ...
  2. In the Admin console, go to Menu Security Authentication. ...
  3. In Third-party SSO profile for your organization, click Add SSO profile.
  4. Check the Set up SSO with third-party identity provider box.

How to create your own SSO? ›

1. Navigate to Website Settings → Authentication → Custom SSO. 2. Create a new Custom SSO.

What is the difference between OAuth and SAML? ›

What Is the Difference Between SAML and OAuth? SAML is designed for authentication and authorization while OAuth was built solely for authorization. Understanding the different purposes of each is key to understanding how an access management system works.

What is single sign-on in simple terms? ›

What is Single Sign-On? Single sign-on (SSO) is an authentication method that enables users to securely authenticate with multiple applications and websites by using just one set of credentials.

What is single configuration? ›

A single configuration file (SCF) is a flat, text file that contains a series of tmsh commands, and the attributes and values of those commands, that reflect the configuration of the BIG-IP® system.

What is the difference between single sign-on and multiple sign-on? ›

MFA is significantly more secure than conventional password logins, but still susceptible to bypass. SSO is secure but is a single point of failure; if the IdP account is compromised, many others may also be. MFA adds a step beyond inputting a password but is still relatively seamless.

References

Top Articles
Latest Posts
Article information

Author: Prof. An Powlowski

Last Updated:

Views: 5442

Rating: 4.3 / 5 (44 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Prof. An Powlowski

Birthday: 1992-09-29

Address: Apt. 994 8891 Orval Hill, Brittnyburgh, AZ 41023-0398

Phone: +26417467956738

Job: District Marketing Strategist

Hobby: Embroidery, Bodybuilding, Motor sports, Amateur radio, Wood carving, Whittling, Air sports

Introduction: My name is Prof. An Powlowski, I am a charming, helpful, attractive, good, graceful, thoughtful, vast person who loves writing and wants to share my knowledge and understanding with you.