Configure single sign-on (SSO) for Okta

Before you can configure SSO for Okta in Incident Response you need to obtain the right credentials.

Before you begin

Note: While this integration with a third-party product is supported, the documentation here is based upon information provided by that third-party. More current information about the operation of that third-party’s system may be available from them directly.

Role required: admin


  1. Log in to your Okta account and navigate to the Admin dashboard.
  2. From the main menu, go to Applications > Add Application > Create New App
  3. In the Create a New Application Integration dialog, configure the connection details.
    1. From the Platform section, select Web.
    2. From the Sign on method section select SAML 2.0.
    3. Select Create
  4. From the Create SAML Integration window, enter a name in the App name field.
  5. Select Next until the Feedback tab appears.
  6. Select Finish, and ensure that you assign your users.
  7. Navigate to the Applications window.
  8. Select the Sign On tab.
  9. Optional: Select Assignments, if you want to assign either a User or Groups.
    1. Select Assign.
    2. Select Assign to People or Assign to Groups.
  10. Note the IdP Identifier URL to use for the IdP Issuer/Entity ID field.
  11. Note the SSO Endpoint URL from your provider to use for the IdP Login URL field.
  12. Optional: Note the logout request endpoint URL from your provider to use for the IdP Logout URL field, if you are enabling Single Sign Out.
  13. Export the X.509 certificate using the PEM format to include the BEGIN header and END footer.
  14. Logout.
  15. Log in to Incident Response.
  16. On the navigation pane, select Admin.
  17. On the Single Sign-on, OAuth Identity form, select Set up and manage SSO.
    Note: Only one authentication feature can be enabled at a time.
    Generic SSO configuration form
  18. Select Edit.
  19. Fill in the SSO fields with the information you noted from your provider.
    Field Description
    IdP Issuer URI/Entity ID Issuer URI of the Identity Provider. This value is usually the SAML Metadata EntityID of the IdP EntityDescriptor.
    IdP Login URL The binding-specific IDP Authentication Request Protocol endpoint that receives SAML AuthnRequest messages from Incident Response.
    IdP Logout URL [Hidden] Visible when Single Sign Out is enabled. This is the logout request endpoint URL for your IdP.
    IdP Signature Certificate
    The PEM encoded public key certificate of the Identity Provider used to verify SAML message and assertion signatures.
    Note: Be sure to include the BEGIN header and END footer with dashes.

    A certificate expiration date is generated after successfully adding the certificate. Placeholder alt text for cert-expiration-date

  20. Optional: Enabled by default. Force password authentication enforces password-based to authentication. Disabling it lets your IdP choose an appropriate authentication method such as MFA or Security key.
  21. Optional: To activate single sign out, select the Enable Single Sign Out toggle switch.
    When enabled it completes the user IdP logout. Otherwise, their logout is only from Incident Response.
  22. Select Save.
    Figure 1. Configured SSO form example
    Completed SSO configuration form
  23. Use the Test connection button to make sure your configuration works.

    Test connection creates a popup with your results.

    When the test succeeds, you can select Activate to enable SSO.

    If the test failed, follow the instructions in the popup and select Close to continue editing.

    Once you have successfully tested your configuration and activated, you're done. Your SSO configuration is enabled.
    Note: To disable the configuration, use the Enable Single Sign In toggle switch back to the off position.

What to do next

See Sign in to Incident Response using Single Sign-on, OAuth, or multi-factor authentication.