Skip to main content
F.A.Q.

Okta SSO setup guide


ravi.kurma

In this article we’ll take a closer look on how to connect your CC to OKTA SSO

What is OKTA Single Sign-on (SSO)

Okta connects any person with any application on any device.

It's an enterprise-grade, identity management service, built for the cloud, but compatible with many on-premises applications. With Okta, IT can manage any employee's access to any application or device. Okta runs in the cloud, on a secure, reliable, extensively audited platform, which integrates deeply with on-premises applications, directories, and identity management systems.

 

General guidance for SSO with InSided:

How to setup OKTA SSO

  1. Go to the applications page in Okta:

 

 

  1. Hit the ‘Create App Integration’ button:

 

  1. Pick SAML 2.0 from the popup:

 

  1. Fill in the general settings with your desired App Name/ Logo / VisibilityExample App Name: inSided SSO

 

 

  1. Next on the SAML settings page, enter in the following information. More information found below:
  • The single sign-on URL can be taken from the metadata download from your control environment by hitting the download metadata option for SAML2 SSO. This can be found on your community-[en].insided.com/integration/sso

 

Opening up the metadata file, you will find the single sign on the URL highlighted below and the entity ID near the top. 

  • You can leave this option ticked:
  • If you want to set up custom attributes e.g submitting usernames, or email addresses as part of the SSO payload then you can configure this here down below - Attribute Statements.

     

  • In this example we will submit the users’ email in the SSO payload as well as a custom role with the ID of 6 (the ID value will correspond to the custom Role ID from the inSided /role/overview page in control).
  • If you wanted to submit more custom roles, these need to be added as either an array of numbers e.g [1,5,6,7] or just a comma delimited string e.g “1,5,6,7”

 

  1. After completing the setup of the app -  you will need to grab the certificate which can be found on the Sign-On page of the app.

 

  • Scrolling down a bit you will see the certificates. Please download this to upload to the inSided SSO page. Click on Actions -> Download Cert.

 

 

 

 

  1. Now head over to the SAML 2 integration page in your control inSided page /integration/sso

 

  1. Here you can paste in the SAML certificate from the previous step into the ‘Public Key’ -  Note to include both the BEGIN/END Cert lines as well. 
  1. You will also need the single sign on url too - this can be obtained by going to you application in Okta, the ‘sign-on’ tab and then expand the SAML 2.0 settings:
    - Here you will see your application login url under ‘sign on url’

 

  1. This can then be pasted into the ‘Single Sign-on URL’ input field and the final result should then look like this:

 

  1. If you want to preserve manually granted custom roles, check the box. If this is not enabled, the custom roles will get overwritten upon signing in again.
  1. Saves changes + test login

 

  1. If you run into any issues please reach out to our support team via ccsupport@gainsight.com

 

If you run into an issue where after logging in you receive: “customer not provided”

On step 5 → Change the return URL to end with “?customer=customer-id” → Where customer-id is your tenant id (i.e. gainsight-us).

Did you find this topic helpful?

0 replies

Be the first to reply!

Reply


Cookie policy

We use cookies to enhance and personalize your experience. If you accept you agree to our full cookie policy. Learn more about our cookies.

 
Cookie settings