How-To
SSO/SAML Okta Configuration
prerequisites create a swimlane user with an email address that will be used across all steps make sure the swimlane url in advanced configuration is the one that is used across all steps configuration create an account on okta developer (if you already have an account, you can create a person in the organization with the same email address as the prerequisite if not, use the same email address to make it easier) create a new application and select saml 2 0 as the sign on method fill the app name and click next configure the saml settings as follows (replace the hostname value) saml settings click finish navigate to the new application and click the assignments tab click assign to people in this case, add the person with the same email address as the prerequisite now click the sign on tab, select the view setup instructions button, and copy the values in the swimlane saml authentication dialog select email address in the name id format field identity provider single sign on url → sso url identity provider issuer → identity provider entity id fill the swimlane host name in the service provider entity id field x 509 certificate → identity provider x509 certificate save the configuration and login by clicking login via sso in the login page sso/saml azure ad configuration prerequisites create a swimlane user with an email address that will be use across all steps configuration create an azure account navigate to the azure active directory service and add a user with the same email address as the prerequisite (invite the user if the email address is different from the organization) create a new enterprise application click on create your own application fill in the app name and click create in the application menu, assign the user we created in step 2 in the application menu, click on set up single sign on select saml as the single sign on method in the basic saml configuration section edit the configuration as follows (replace the hostname value) in the saml signing certificate section download the certificate (base64) with the information of the set up appname section fill the swimlane saml authentication dialog select email address in the name id format field login url → sso url azure ad identifier → identity provider entity id fill the swimlane host name in the service provider entity id field rename the certificate extension to cert and upload it → identity provider x509 certificate save the configuration and login by clicking login via sso in the login page