Single Sign On (SSO) with Okta

Single Sign On (SSO) with Okta Connect Identity Providers (IdP) to ScatterSpoke for user management Andrew Dawson

Okta adds authentication, authorization, and user management to your web or mobile app within minutes.

For general information about ScatterSpoke Single Sign-On feature, refer to the Single Sign-On with ScatterSpoke document. This document describes the specific instructions you can use to integrate your okta with ScatterSpoke SSO.

Prerequisites

  • Relying party SAML 2.0 service url

  • Relying party trust identifier

Okta SAML Setup

New Application Integration

The easiest way to setup ScatterSpoke SAML integration is by following this guide. You can follow steps 1-4 as written.

On step 5, put ScatterSpoke as the app name.  If you would like to add our logo you can get that here.

On step 6,  put the relying party SAML 2.0 service url that we provided to you in the field Single sign on URL and the relying party trust identifier in the audience URI (SP entity ID).  On the default RelayState, put "RelayState".

On step 7, if you do not wish to provide the names we will use email address as both name and email field. We always prefer to have everyones names!

On step 8, uncheck the box call app type.

Step 9 provides you will the Identity Provider metadata link.  You will provide this link to ScatterSpoke so we can make the proper configurations on our side.

On step 10, make sure you assign the correct people to the application.  This essentially gives them permission to use the newly created ScatterSpoke application.

Follow steps 11-13 as they are.

Wrapping Up

To finish up the Okta integration you need to provide ScatterSpoke with the following:

  • Identity Provider metadata link: This link from step 9 contains all the required information for ScatterSpoke to configure SSO.

Though not necessary, it's also helpful to provide ScatterSpoke with a test account to verify the integration.

Did this answer your question?