Skip to main content

SSO to IOMETE with Okta

This guide explains how to use Okta with SAML 2.0 to authenticate users in the IOMETE account console. Follow the steps below to integrate Okta for Single Sign-On (SSO) with IOMETE.


Okta SSO Configuration Steps

1. Retrieve the IOMETE Redirect URL

  • In the IOMETE console, navigate to Settings > Single Sign-On under IAM.
  • Select SAML 2.0.
  • Copy the IOMETE redirect URL displayed on the SAML configuration page. You will need this when setting up your application in Okta.
SAML configuration in IOMETE | IOMETESAML configuration in IOMETE | IOMETE

2. Create an IOMETE Application in Okta

  • Log in to the Okta Admin Console.
  • From the sidebar, go to Applications and click Create App Integration.
  • Choose SAML 2.0 as the sign-on method and click Next.
Creating a new SAML app in Okta | IOMETECreating a new SAML app in Okta | IOMETE
SAML app creation steps in Okta | IOMETESAML app creation steps in Okta | IOMETE
  • For App Name, enter the name of your app and click Next.

    General settings for Okta SAML | IOMETEGeneral settings for Okta SAML | IOMETE
  • Single sign-on URL: Paste the IOMETE redirect URL you copied earlier.

  • Audience URI (SP Entity ID): Paste the IOMETE redirect URL again.

  • Name ID format: Choose Persistent.

SAML configuration settings in Okta | IOMETESAML configuration settings in Okta | IOMETE

3. Configure Attribute Statements

In the Attribute Statements section, set up the following attributes to map user details from Okta to IOMETE:

NameName FormatValue
usernameUnspecifieduser.login
emailUnspecifieduser.email
firstNameUnspecifieduser.firstName
lastNameUnspecifieduser.lastName
Configuring SAML attribute statements in Okta | IOMETEConfiguring SAML attribute statements in Okta | IOMETE

Click Next to proceed.

4. Obtain SAML Integration Information

After the setup is complete, Okta will provide you with the following details. These are required to configure IOMETE:

  • Identity Provider Issuer (Entity ID).
  • Single Sign-On URL (also known as the SAML endpoint).
  • X.509 Certificate.
SAML integration details in Okta | IOMETESAML integration details in Okta | IOMETE

5. Configure Okta in IOMETE

Go back to the IOMETE SSO configuration page and enter the information obtained from Okta:

  • Entity ID: Paste the Okta Issuer URL.
  • Single Sign-On URL: Paste the Okta SAML endpoint.
  • X.509 Certificate: Upload the certificate provided by Okta.

Click Save to save your settings, and then click Enable SAML SSO to activate Single Sign-On.

Filling in SAML details in IOMETE | IOMETEFilling in SAML details in IOMETE | IOMETE

6. Assign Users to the IOMETE Application in Okta

After configuring SAML SSO, ensure users have access to the IOMETE app in Okta:

  1. In the Okta Admin Console, navigate to Applications > Assignments.
  2. Assign users or groups who should have access to IOMETE.
Assigning users to the IOMETE app in Okta | IOMETEAssigning users to the IOMETE app in Okta | IOMETE

Conclusion

After successfully configuring Okta SSO with IOMETE, you can test the integration. Try logging out of the IOMETE page, and you should see the Okta login page!

Okta signin page | IOMETEOkta signin page | IOMETE
Tip

During the SSO testing phase, it's advisable to keep the IOMETE account console open in a separate browser window to avoid being locked out.