Skip to main content
Skip table of contents

Okta Single Sign-On / Logout

Set up a SAML application in Okta

  1. Click Application from the menu bar.
  2. Click Add Application and then Create new Application.
  3. In the Create a New Application Integration dialog box, leave Web as the platform and select SAML 2.0 as the protocol that you want to use to sign in. Click Create.
  4. In General Settings, enter the application name and click Next.

Configure SAML Single Sign-On in Okta

  1. In the SAML Settings, paste the Assertion Consumer Service (ACS) URL into the SSO URL field. This URL depends on the account domain but generally looks like this:
    https://<account-domain>:8443/assertion/saml
  2. Paste the Issuer ID value from the SAFEQ Cloud SAML configuration into the Audience URI (SP Entity ID) field, or use https://<accountdomain>:8443/ pattern if the issuer ID is empty.
  3. Select the Name ID format and Application username that your application requires. For example, EmailAddress and Email, or leave the defaults.
  4. In the Attribute Statements (Optional) section, add the required SAML attributes for your application.
  5. In the Group Attribute Statements (Optional) section, add the required group attributed for your application.
  6. Click Next. On the Feedback page, select I’m an Okta customer adding an internal app.
  7. For the App type, select This is an internal app that we have created.
  8. Click Finish.

Assign users to the created application

  1. Click the Assignments tab.
  2. Click Assign. Select either Assign to People or Assign to Groups. Enter the people or groups who you want to Single Sign-On into the application. Click Assign for each.
  3. Verify the user-specific attributes for any people you add, and then select Save and Go Back.
  4. Click Done.

Configure SAML Single Logout in Okta

  1. The configuration for Single Logout must be done in the advanced settings. On the configuration screen, click on Show Advanced Settings.
  2. You will then see additional settings. Among them is the Single Logout.
  3. Select the Enable Single Logout option.
  4. Add the Single Logout URL. This is a URL that points to the SAFEQ Cloud Web UI. The “domain” host name should be the one you used for the single sign-on URL above.
  5. For the Signature Certificate, you can use the SAFEQ Cloud Web UI public certificate. Once you have accessed the SAFEQ Cloud Web UI with your browser, the certificate is stored either in your browser or in a key chain application of your operating system. In both cases, you must export the certificate to a file and specify it here to upload.
  6. With this configuration, you are automatically logged out of Okta when you click the logout button in SAFEQ Cloud Web UI.

Perform the following steps to export the SAFEQ Cloud Web UI certificate from Firefox:

  1. Open Firefox preferences.
  2. Go to Privacy & Security.
  3. Scroll down and click View Certificates under Security > Certificates.
  4. Find and select the certificate for the entry with the right hostname and port 8443, which is the SAFEQ Cloud Web UI (unless your setup has a different UI port).
  5. Export the selected certificate.



JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.