- 30 Jul 2024
- 2 Minutes to read
- Print
- DarkLight
- PDF
Okta
- Updated on 30 Jul 2024
- 2 Minutes to read
- Print
- DarkLight
- PDF
Step by step guide to configure Okta as a SAML Identity Provider within Visma
Follow the steps below to configure Okta as a SAML Identity Provider within Visma. Keep Authentication Settings open in your browser while you access Okta in a new window or tab. You will need to return to the Single Sign-On page to complete the configuration steps.
Prerequisites
Okta account
All of your users under your account in Visma will need a pre-existing account in Okta with exactly the same email address.
Configure Visma Single Sign-On app in Okta
On the Single Sign-On page go to section 1. Configure Visma metada detalis into Okta
Log into your Okta administrative portal.
Go to left menu and click Applications. Select Applications.
Click Create App Integration.
Select SAML 2.0 and click Next.
Name your application and click Next.
Copy the SAML Assertion Consumer link from Authentication Settings and paste this link into the Single sign on URL.
While on the “Create SAML Integration” page copy the Entity ID from Authentication Settings and paste it into the Audience URI (SP Entity ID) field in Okta.
For Name ID Format select EmailAddress.
For Application username select Email.
For Update application username select Create and update.
Click on Show Advanced Settings.
Enable Allow application to initiate Single Logout.
While on the “Create SAML Integration” page copy the SAML Logout from Authentication Settings and paste it into the Single Logout URL field in Okta.
While on the “Create SAML Integration” page copy the Entity ID from Authentication Settings and paste it into the SP Issuer field in Okta.
You only need to do this step if you want to enable the Single Logout feature. Return to the Authentication Settings and download the Public certificate, While on the “Create SAML Integration” page click Browse and upload the downloaded certificate and then click Upload Certificate.
While on the “Create SAML Integration” page for section Attribute Statements (optional) copy the 2 attributes from Authentication settings section 2. Configure claims in Okta.
Leave all other fields empty and click Next.
Select the applicable option and click Finish.
Configure Visma Single Sign-On to use Okta.
While on your newly created application in Okta, right click the Identity Provider metadata link and copy the link address. Your Metadata XML link address should look like: https://xxxxxxxx.okta.com/app/xxxxxxxx/sso/saml/metadata
Paste this Metadata XML link address into the Single Sign-On page within Authentication Settings. It contains all your Okta endpoints and public certificate that Visma needs in order to complete the setup.
Click Preview Data.
Continue with your Advanced configuration and click Save.
Testing Single Sign-On after Visma has made its configuration
To make sure SSO is working, perform these steps
To test SSO access go to your Visma MyDomain e.g. https://example.my.connect.visma.com directly, and then click the Sign in with Okta button.