Okta
  • 30 Jul 2024
  • 2 Minutes to read
  • Dark
    Light
  • PDF

Okta

  • Dark
    Light
  • PDF

Article summary

Step by step guide to configure Okta as a SAML Identity Provider within Visma

Follow the steps below to configure Okta as a SAML Identity Provider within Visma. Keep Authentication Settings open in your browser while you access Okta in a new window or tab. You will need to return to the Single Sign-On page to complete the configuration steps.

Prerequisites

  • Okta account

  • All of your users under your account in Visma will need a pre-existing account in Okta with exactly the same email address.

Configure Visma Single Sign-On app in Okta

  1. On the Single Sign-On page go to section 1. Configure Visma metada detalis into Okta

    AuthSettings_SSO_Okta_Step1
  2. Log into your Okta administrative portal.

  3. Go to left menu and click Applications. Select Applications.        

  4. Click  Create App Integration.        

    AuthSettings_SSO_Okta_Step4
  5. Select  SAML 2.0 and click Next.        

    AuthSettings_SSO_Okta_Step5
  6. Name your application and click Next.        

    AuthSettings_SSO_Okta_Step6
  7. Copy the SAML Assertion Consumer link from Authentication Settings and paste this link into the Single sign on URL.        

  8. While on the “Create SAML Integration” page copy the  Entity ID from Authentication Settings and paste it into the  Audience URI (SP Entity ID) field in Okta.        

  9. For Name ID Format select EmailAddress.        

  10. For Application username select Email.        

  11. For Update application username select Create and update.

    AuthSettings_SSO_Okta_Step11
  12. Click on Show Advanced Settings.        

  13. Enable Allow application to initiate Single Logout.

  14. While on the “Create SAML Integration” page copy the  SAML Logout from Authentication Settings and paste it into the Single Logout URL field in Okta.        

  15. While on the “Create SAML Integration” page copy the Entity ID from Authentication Settings and paste it into the  SP Issuer field in Okta.        

  16. You only need to do this step if you want to enable the Single Logout feature. Return to the Authentication Settings and download the Public certificate, While on the “Create SAML Integration” page click                           Browse and upload the downloaded certificate and then click  Upload Certificate.        

    AuthSettings_SSO_Okta_Step16
  17. While on the “Create SAML Integration” page for section Attribute Statements (optional) copy the 2 attributes from Authentication settings section 2. Configure claims in Okta.        

    AuthSettings_SSO_Okta_Step17
  18. Leave all other fields empty and click Next.        

  19. Select the applicable option and click  Finish.        

Configure Visma Single Sign-On to use Okta.

  1. While on your newly created application in Okta, right click the  Identity Provider metadata link and copy the link address. Your Metadata XML link address should look like: https://xxxxxxxx.okta.com/app/xxxxxxxx/sso/saml/metadata        

    AuthSettings_SSO_Okta_ConfigureVisma_Step1
  2. Paste this Metadata XML link address into the Single Sign-On page within Authentication Settings. It contains all your Okta endpoints and public certificate that Visma needs in order to complete the setup.

  3. Click Preview Data.        

    AuthSettings_SSO_Okta_ConfigureVisma_Step3
  4. Continue with your Advanced configuration and click Save.        

    AuthSettings_SSO_Okta_ConfigureVisma_Step4

Testing Single Sign-On after Visma has made its configuration

To make sure SSO is working, perform these steps

  1. To test SSO access go to your Visma MyDomain e.g. https://example.my.connect.visma.com directly, and then click the Sign in with Okta button.

    AuthSettings_SSO_Okta_Test_Step1


Was this article helpful?

What's Next
Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.