Setting Up Single Sign On (SSO)

 

 

This is a document explaining how to connect an Okta Client's SAML Login to our login. 

Instructions

  1. Connect with your CSM and pick out a unique connection name like their your company domain name or the User ID of the team owner. This will be the name of the connection that will be used in the callback link and the Sendoso system. 
  2. Go through the process of setting up Sendoso as a new application in your settings.

Configuring Okta

Log in to your Okta account. If you don't already have one, you will need to create one.

On the general Okta dashboard, click Admin. This takes you to the Okta Admin Dashboard.

Okta_Dashboard.png

 

Using the list of shortcuts at the right-hand side of the screen, click Add Applications.

Okta_Applications.png

On the Add Application page, select Create New App.

Create_New_App.png

On the Create a New Application Integration pop-up window, select the Platform for your application, and choose SAML 2.0 as the Sign on method. Click Create to proceed.

New_App_Integration.png

You will now create your SAML integration. On the General Settings page, provide the following:

  • App name: Sendoso
  • App logo: 
    Sendoso-Logo-Color.png


  • App visibility: select whether you want your users to see your application icon and in what settings.

App_Visibility.png

Click Next to proceed.

Next, you will see the SAML Settings page. Enter the following values into the appropriate fields:

  • Single sign on URLhttps://sendosoprod.auth0.com/login/callback?connection=YOUR_CONNECTION_NAME
  • Audience URI (SP Entity ID)urn:auth0:sendosoprod:YOUR_CONNECTION_NAME

Attribute_Statement.png

You will also need to add the following Attribute Statement:

  • Name: email
  • Name format (optional): Unspecified
  • Value: ${user.email}

At this point, you can click Preview the SAML Assertion to generate XML you can use to verify that your provided settings are correct.

Click Next to proceed.

Lastly, answer Are you a customer or partner? by selecting I'm an Okta customer adding an internal app. Click Finish.

Internal_App.png

You'll be directed to the Sign On page for your newly-created app. Click on View Setup Instructions to complete the process.

Complete_the_process.png

Take note of the Identity Provider Single Sign-On URL, and download a copy of the X.509 Certificate - send it to you/product team! 

This is the certificate Sendoso requires to verify your users identity during the sign on process.  

Certificate.png

 

Set up and test SSO

Once the Sendoso team has this following information, it will enable your account for SSO. Once activated, you will be notified by the Sendoso team. Once completed, this is a sample login page your users will see, with the password field removed:

 

SSO_Image.png


Get in touch: Email support@sendoso.com or your account representative with the title "SSO Support Requested". In the body, you can optionally include any details such as timelines, specifics of your SSO provider, or other information you find pertinent to the setup. You should receive a response back from the SSO support team within 24 hours.


Commonly Asked Questions
Do you support SSO providers like Okta and OneLogin?

Yes, we support Okta and OneLogin. 

Do you support auto-provisioning of users?

Not yet! Coming soon... 

Was this article helpful?
0 out of 0 found this helpful

Comments

0 comments

Please sign in to leave a comment.