This portion of the guide takes you through the steps for configuring your specific SSO integration using the Okta Admin Console.
After you create your integration in the previous task, the Admin Console opens the main settings page for your new integration. In here, you can specify General Settings and Sign On options, as well as assign the integration to users in your org. Click Edit if you need to change any of the options, and Save when you have made your changes.
Specify SAML settings On the General tab, in the Application area, you can rename your integration and select visibility and launch options. You can also make any changes to the SAML settings if they changed from your original values.
On the Sign On tab, you can download the Identity Provider metadata for your integration. This information is needed to configure the SAML connection settings inside your SAML SP application:
In the SIGN ON METHODS section, locate the Identity Provider metadata link right above the CREDENTIALS DETAILS section.
Right-click the Identity Provider metadata link and select Copy Link Address . The metadata contained at this link has the information required by your SAML SP application.
We recommend copying the Identity Provider metadata link to dynamically configure the metadata. If your SP doesn't support dynamic configuration, you can click the Identity Provider metadata link instead, and a new browser tab launches with the information that you need:
Identity Provider Issuer X.509 Certificate Identity Provider Single Sign-On URL In your SAML SP application, you can paste the link or the metadata as required to configure the IdP metadata.
If you have an existing application where you want to add SAML SSO, the following open source and paid tool kits are another way to help you implement the SAML 2.0 specification for the WebSSO Profile for Service Providers using different programming languages:
Note: Okta doesn't own or maintain these toolkits, though we do provide documentation to help you use them with Okta.