The following manual configuration creates a SAML SSO configuration for your Enterprise organization.
Owner
or admin
role in an Enterprise organization
Service provider certificate and private key that you create
This configuration supports the following:
Service Provider initiated SSO
Single Log Out [optional]
Before configuring SSO, you need to assign a namespace and create a Service Provider certificate and private key. These important steps provide information you need to enter later.
Create your namespace:
Go to Organization > SSO.
Under Namespace, enter the namespace you want for your organization. For example, acme_corp
. Your organization members enter this namespace when they log in via SSO.
Under SSO type, select SAML 2.0.
Convert your Make Service Provider certificate into a .pem
file:
Find the certificate under Service Provider Certificate.
Highlight and copy all of the certificate.
Paste the certificate into a plain text editor.
Windows: use Notepad.
Mac OS: use TextEdit.
Save the file as a .pem
file
![]() |
Caution |
---|---|
You may need to select All files ( *.* ) or rename the file after saving to change the extension to |
This creates one .pem
file. Locate the .pem
file and have it ready to upload into Okta later.
Log in to Okta and go to Admin > Applications > Applications.
Click Create app integration and select SAML 2.0.
Name your app and upload your icon.
Click Next.
Configure the following SAML settings:
Click Show advanced settings and enter the following:
Response |
Select Signed |
|||||||||
Assertion signature |
Select Signed |
|||||||||
Signature algorithm |
Select RSA-SHA256 |
|||||||||
Digest algorithm |
Select SHA256 |
|||||||||
Assertion encryption |
Select Unencrypted
|
|||||||||
Signature certificate |
Upload a |
|||||||||
Enable Single Logout |
Leave unchecked |
|||||||||
Signed requests |
Optional |
|||||||||
Other requestable SSO URLs |
Optional |
|||||||||
Assertion inline hook |
Select None (disable) |
|||||||||
Authentication context class |
Select PasswordProtectedTransport |
|||||||||
Honor force authentication |
Select Yes |
|||||||||
SAML issuer ID |
http://www.okta.com/${org.externalKey} |
Enter the following attributes and click Next.
Name |
Name format |
Value |
---|---|---|
profileFirstName |
Unspecified |
user.firstName |
profileLastName |
Unspecified |
user.lastName |
|
Unspecified |
user.email |
Select the following options and click Finish.
Are you a customer or partner? |
Select I'm an Okta customer adding an internal app |
App type |
Select This is an internal app that we have created |
To locate your IdP login URL and certificate:
Go to Admin > Applications > Applications and select your SAML SSO app. to access the necessary information.
Go to the Sign on tab and click View SAML setup instructions.
Go to Organization > SSO.
Enter the following information from Okta into the IdP login URL and Identity provider certificate fields.
Field on Okta |
Field on Admin > System settings |
---|---|
Identity provider single sign on URL |
IdP login URL |
X.509 certificate |
Identity provider certificate |
Enter the following in the Login IML resolve field:
{"email":"{{get(user.attributes.email, 1)}}","name":"{{get(user.attributes.profileFirstName, 1)}} {{get(user.attributes.profileLastName, 1)}}","id":"{{user.name_id}}"}
Select the following settings:
Allow unencrypted assertions |
Yes |
Allow unsigned responses |
No |
Sign requests |
Yes |
Click Save.
Go to {{Make}}'s login page.
Click Sign in with SSO.
Enter the namespace you chose for your organization.
Log in using your Okta credentials and consent to {{Make}}'s access to your user data.