# Okta SSO integration

This guide outlines the steps to integrate Okta with Vectice using SAML, focusing on configuring a secure Single Sign-On (SSO) connection.

1. If you are an Admin, go to **Organization Setting** by clicking your profile icon.

<img src="https://2339220862-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FbO7GsO4mI4pjZ7XjnzBT%2Fuploads%2Fgit-blob-cc4dab8b97294c58ae3d2268e6b070ef3ed8f82e%2FScreenshot%202024-01-01%20at%2010.59.04%E2%80%AFAM.png?alt=media" alt="" data-size="original">

2. Click on the tab **Authentication settings** and click <img src="https://2339220862-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FbO7GsO4mI4pjZ7XjnzBT%2Fuploads%2Fgit-blob-764f40e90af1bafc8c725c81027f4e3902dc0e9e%2FScreenshot%202024-01-01%20at%2011.10.10%E2%80%AFAM.png?alt=media" alt="" data-size="line">
3. On the SAML Form, enter a name for the connection.

<figure><img src="https://2339220862-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FbO7GsO4mI4pjZ7XjnzBT%2Fuploads%2Fgit-blob-0ef841296d7ac3921004c8934e0456418e5bb0b6%2Fokta-name.png?alt=media" alt=""><figcaption></figcaption></figure>

4. Click on <img src="https://2339220862-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FbO7GsO4mI4pjZ7XjnzBT%2Fuploads%2Fgit-blob-18b9121c7667de5c62798624d768f1c5f38ea55f%2FScreenshot%202024-01-01%20at%2011.07.11%E2%80%AFAM.png?alt=media" alt="" data-size="line"> to generate your **Redirect URI** and the **Entity ID** that you’ll need in Okta.
5. To prepare the SAML integration, go to **Okta Admin** and select **Applications -> Applications**. ![](https://lh7-us.googleusercontent.com/DN3s2VQfK0tCKiaekW2kD_FuH_dUsGGZoDYeu8xndn9a3OQkMyMESso83tgXFndpbPZ6E435HhDhtX8pFkovoaI3ls6roDymD3N5zDHoLJXxag3N58HxN388BbeByHiHSzSgDq98avaWIxiBiafqrg)
6. Create a new SAML 2.0 App integration by selecting **Create App Integration -> SAML 2.0 -> Next**.

   <figure><img src="https://2339220862-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FbO7GsO4mI4pjZ7XjnzBT%2Fuploads%2Fgit-blob-7654f5ca5d4b4f37b9a640dda8d6d3a5d2f2ee9e%2FScreenshot%202024-01-01%20at%2011.16.53%E2%80%AFAM.png?alt=media" alt=""><figcaption></figcaption></figure>
7. Set the app name, ‘Vectice’ for example -> check ‘Do not display application icon to users’ -> click Next.

{% hint style="info" %}
Currently, logins initiated from Okta are not supported.
{% endhint %}

8. Copy the **Single sign-on URL** and **Audience URI (SP Entity ID)** from Vectice's **Redirect URI** and **Entity ID**, and paste them into the SAML settings in Okta.
9. For **Application username**, choose ‘Email’. Click **Next** and Finish the creation of the Okta SAML Integration.
10. You will arrive in your SAML Integration Page, click on **View** **SAML setup instructions**.

    <figure><img src="https://2339220862-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FbO7GsO4mI4pjZ7XjnzBT%2Fuploads%2Fgit-blob-dcfd937e4d28d2c77c7839bd5c392bc7f40cd850%2FSaml-setup.png?alt=media" alt=""><figcaption></figcaption></figure>
11. Copy the **Identity Provider Single Sign-On URL** from this Okta page to use in Vectice.

    <figure><img src="https://2339220862-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FbO7GsO4mI4pjZ7XjnzBT%2Fuploads%2Fgit-blob-98f47dbe2fa4a77c19745eacf7f8feee30e4fd18%2Fidentity-provider.png?alt=media" alt=""><figcaption></figcaption></figure>
12. In Vectice, go to Organization settings -> Authentication Method and update the 'Single Sign On Service URL' with Okta's value. Select **Enabled** and save.

:tada: **You have enabled Okta SSO authentication for Vectice!**

Now, when users log in to Vectice, they will see an option to login with Okta SSO below the password field.

With SSO enabled, you have a few options:

* You can disable password authentication if you want users to only login via SSO
* You can enable the ability for users to automatically receive a Vectice account from their SSO provider (auto-provisioning)
* You can set up the roles in Okta if they want more fine-tuning on this level.
