Skip to main content

About Okta SAML Integration

Single Sign-On with Okta (SAML) in Iru Endpoint lets you set up SAML-based SSO integration with Okta for users accessing Iru Endpoint through their Okta credentials.

How It Works

Okta SAML integration lets users authenticate to Iru Endpoint using their existing Okta credentials. Once configured, users can access Iru Endpoint through a single sign-on experience. The integration works by establishing a trusted relationship between Iru Endpoint and Okta, where Okta acts as the identity provider (IdP) and Iru Endpoint acts as the service provider (SP). When users attempt to access Iru Endpoint, they’re redirected to Okta for authentication, and upon successful login, Okta sends a SAML assertion back to Iru Endpoint confirming the user’s identity. SSO can be used for Iru Endpoint Web App sign-in and for Require Authentication with Automated Device Enrollment.

Setting Up the SAML Connection

You’ll need to complete the initial setup in Iru Endpoint first to get the configuration information required for Okta. After copying the Entity ID and ACS URL, switch to the Okta Configuration tab to continue.
1

Navigate to the Account Menu Button

In Iru Endpoint, in the sidebar, click the Account Menu Button.
2

Access Authentication Settings

Click the Access option in the menu.
3

Select Admin and Authentication

Select the Admin and authentication tab (selected by default) and scroll down to Authentication methods.
4

Add Authentication Method

Click + Authentication method.
5

Enter Display Name

Enter a display name for the SSO Connection.
6

Select Authentication Method

Select SAML for the Authentication method.
7

Create Connection

Click Create.
8

Configuration Information

Click Configuration information if that section is not already expanded.
9

Copy Service Provider Entity ID

Copy the Service provider entity ID into a text document for later use. You’ll need this for the Okta configuration.
10

Copy ACS URL

Copy the Assertion consumer service (ACS) URL into a text document for later use. You’ll need this for the Okta configuration.
11

Keep Tab Open

Keep the Iru Endpoint configuration modal open, then switch to the Okta Configuration tab to continue.

Configuring Iru Endpoint SAML Connection

After completing the Okta configuration, return here to finish setting up the SAML connection in Iru Endpoint. You’ll need the Single Sign-on URL, IdP Entity ID, and certificate from Okta.
1

Return to Iru Endpoint

Go back to the Custom SAML modal in Iru Endpoint.
2

Set IdP Attribute

Set IdP attribute to Subject.
3

Set Attribute Name

Leave Attribute name blank.
4

Set User Attribute

Set User attribute to User Principal Name (UPN).
5

Configure Sign In URL

Paste the Single Sign-On URL you copied from Okta into the Sign In URL text field.
6

Add IdP Entity ID

Paste the Issuer information you copied from Okta into the IdP Entity ID field.
7

Upload Certificate

Upload the Okta certificate you downloaded earlier.
8

Set Protocol Binding

Set the Protocol Binding to HTTP-POST.
9

Set Request Algorithm

Ensure that the Request Algorithm is set to RSA-SHA256.
10

Set Digest Algorithm

Ensure that Sign Request Algorithm Digest is set to SHA256.
11

Enable Sign Request

Ensure that Sign Request is enabled.
12

Set Response Signature Verification

Set the Response Signature Verification to Assertion.
13

Set Destination

Leave the Destination field blank.
14

Set Allowed Signature Algorithm

Set Allowed Signature Algorithm to RSA-SHA256.
15

Set Allowed Digest Algorithm

Set Allowed Digest Algorithm to SHA256.
16

Save Configuration

Click Save.

Allow for Tenant Authentication

Once you have configured the SAML connection in Iru Endpoint and your identity provider, you can allow its use for tenant authentication. For step-by-step instructions, please refer to the Allowing Tenant Authentication and Managing Connections section in our Single Sign-on support article.

Limit Authentication to Domain

When configuring the SAML connection, you can optionally limit authentication to one or more domains. This can be useful when the SSO connection could authenticate to multiple domains. You can limit the authentication to your Iru tenant to a subset of the available domains.

Enforcing Single Sign-On

Once you have configured at least one Single Sign-on connection, you can disable Passkey, Google Social, and Microsoft Social connections. Disabling these connections will disable the ability for Iru Endpoint administrators in your tenant to authenticate via those methods. Please refer to our Single Sign-on support article for step-by-step instructions.

Testing the Integration

1

Add Test User

Add a test user to the Admin Team in Iru Endpoint by clicking New User.
2

Configure User Information

Fill in all of the corresponding user information. This user must exist in Okta and must be assigned to the Okta SSO app in your Okta tenant.
3

Submit User

Click Submit.
4

Close Invite Window

Once the invite is submitted, close the Invite User window.
5

Refresh Access Page

Refresh the Access page in Iru Endpoint. You should see the user who was added.
6

Test SSO Login

Go to the user’s email to accept the invite and log in with the new SAML SSO connection.