Setting Up Okta SSO


  1. Connect with our support team and pick out a unique connection name like your company domain name or the User ID of the team owner. This will be the name of the connection that will be used in the callback link and the Sendoso system. 
  2. Go through the process of setting up Sendoso as a new application in your settings.

Click here to read through some commonly asked questions.

Configuring Okta

Log in to your Okta account. If you don't already have one, you will need to create one.

On the general Okta dashboard, click Admin. This takes you to the Okta Admin Dashboard.



Using the list of shortcuts at the right-hand side of the screen, click Add Applications.


On the Add Application page, select Create New App.


On the Create a New Application Integration pop-up window, select the Platform for your application, and choose SAML 2.0 as the Sign on method. Click Create to proceed.


You will now create your SAML integration. On the General Settings page, provide the following:

  • App name: Sendoso
  • App logo: 

  • App visibility: select whether you want your users to see your application icon and in what settings.


Click Next to proceed.

Next, you will see the SAML Settings page. Enter the following values into the appropriate fields:

  • Single sign on URL
  • Audience URI (SP Entity ID)urn:auth0:sendosoprod:YOUR_CONNECTION_NAME


You will also need to add the following Attribute Statement:

  • Name: email
  • Name format (optional): Unspecified
  • Value: ${}

At this point, you can click Preview the SAML Assertion to generate XML you can use to verify that your provided settings are correct.

Click Next to proceed.

Lastly, answer Are you a customer or partner? by selecting I'm an Okta customer adding an internal app. Click Finish.


You'll be directed to the Sign On page for your newly-created app. Click on View Setup Instructions to complete the process.


Take note of the Identity Provider Single Sign-On URL, and download a copy of the X.509 Certificate.

This is the certificate Sendoso requires to verify your users identity during the sign on process.  


Set up and test SSO

Once the Sendoso team has the following information, it will enable your account for SSO. Once activated, you will be notified by the Sendoso team. Once completed, this is a sample login page your users will see, with the password field removed:



Get in touch: Please contact support to complete the setup by choosing SSO and Complete Set Up on your Support Request. You can also include any details such as timelines, specifics of your SSO provider, or other information you find pertinent to the setup. 

Commonly Asked Questions

Do you support SSO providers like Okta and OneLogin?

Yes, we support Okta and OneLogin

Do you support enforcing SSO login only?

Yes, we can enable SSO login only. Users logging in via Sendoso will be automatically redirected to your SSO landing page. 

Do you support auto-provisioning of users?

Yes, if you wish to auto-provision users please note that in your support request to set up SSO along with the default team you would like to assign new users to when it is not specified properly in the auto-provisioning.

To auto-provision users, Sendoso also requires the following Attribute Statements:

  • email:
  • firstname: user.firstName
  • lastname: user.lastName
  • division: user.division (valid options are the name of any Team setup on Sendoso)
  • usertype: user.userType (valid options are "regular" or "manager" default will be regular)


Was this article helpful?
2 out of 2 found this helpful



Article is closed for comments.