Okta using SAML

Follow the steps below to configure single sign-on (SSO) for Claris Studio with Okta using SAML. To establish trust between your identity provider and a Claris Studio team, you'll need to:

  • Create a SAML application.

  • Edit the integration details.

  • Assign users.

  • Enter the metadata URL in Claris Studio.

Open the Claris Studio setup page

  1. Sign in to your Claris Studio team.

  2. Click the Users tab on the left, then click Configure External IdP.

    Claris Studio external IdP settings

  3. In the Configure External Identity Provider dialog, for Protocol, choose SAML. Keep this page open to come back to later.

Create a SAML application

  1. Sign in to your Okta administrator account at https://<okta-subdomain>.okta.com/admin/getting-started where <okta-subdomain> is your business’s Okta subdomain.

  2. In the left sidebar, click Applications > Applications.

    Okta, Applications

  3. On the Applications page, click Create App Integration.

    Okta, Create App Integration

  4. For Sign-in method, select the SAML 2.0 option, then click Next.

    Okta, Create a new app integration, SAML 2.0

Edit SAML application information

  1. You’ll now see a form to add new data. For App name, enter a name that will help you distinguish this integration from any others.

    Click Next.

    Okta, Create SAML Integration, General Settings

  2. In Configure SAML step, enter the following details for each field:

    • Single sign-on URL: In Claris Studio, copy Assertion Consumer Service URL (see “Open the Claris Studio setup page” earlier) and paste it in here.

      • Use this for Recipient URL and Destination URL: Keep this option selected.

    • Audience URI: In Claris Studio, copy Entity ID (see “Open the Claris Studio setup page” earlier) and paste it in here.

    • Default RelayState: Keep this empty.

    • Name ID format: Choose Persistent.

    • Application username: Choose Email.

    • Update application username on: Choose Create and update.

    Okta, Create SAML Integration, Configure SAML, SAML Settings

  3. Fill out the Attribute Statements section. Add the following mappings where Name format will always be Unspecified. Remember that the mapping Name values should be typed exactly as shown because they are case sensitive.

    • Firstname → choose user.firstName value

    • Lastname → choose user.lastName value

    • Email → choose user.email value

    Okta, SAML Integration Attribute Statements

  4. Click Next.

    Okta, Preview the SAML Asssertion

  5. You may now see a screen asking for feedback from Okta. You can click Finish here without supplying any information.

    Okta, Create SAML Integration, Finish

  6. You should now be redirected to the Sign on section of your newly created app. Under Metadata Details, copy the Metadata URL and save it somewhere secure where you can retrieve it later.

    Okta, Settings, Sign on methods, Metadata URL

Assign users to your SAML integration

  1. Click the Assignments tab, then click Assign to People or Assign to Groups.

    Okta, Assignments

  2. Select all people or all groups from your Okta organization that should have access to this Claris Studio team.

    To assign to everyone, for the Assign to Groups option, click Assign next to the Everyone option.

    Click Done when finished.

    Okta, Assign to Groups

Enter values into Claris Studio

  1. Go back to the Claris Studio page you opened earlier (see “Open the Claris Studio setup page”).
  2. In the Configure External Identity Provider dialog, for Protocol, choose SAML. Then for Metadata, paste the Metadata URL value that you saved in “Edit SAML application information.”

  3. Select one or more Default Groups that you want to sign in using this external IdP, then click Apply.

    If you have no groups, you can create one here and add users to it later. See Work with groups for more information.

    Claris Studio, Okta SAML external IdP configuration

  4. On the Users page, copy the link labeled Application Login URL and provide it to users. Using this URL enables them to sign in to Claris Studio with their SSO credentials.