Log into your OKTA account
- Go to https://*******-admin.okta.com/admin/apps/active
- Click on Add Application
- Create a new app
- Select Platform Web and SAML 2.0
In the SAML Settings fill in the following fields:
- Single Sign On URL
- https://<your-subdomain>.mobilize.io/users/auth/saml/callback
- Recipient URL
- https://<your-subdomain>.mobilize.io/users/auth/saml/callback
- Destination URL
- https://<your-subdomain>.mobilize.io/users/auth/saml/callback
- Audience Restriction
- https://<your-subdomain>.mobilize.io/users/auth/saml/metadata
Note: These domains must be linked to your community's current domain. If your domain updates or if you are using a custom domain- the new domain must be reflected here.
- In the assignments tab, make sure you added the member in the assignments
Go to Sign on tab
- View Setup Instructions
- Copy Identity Provider Single Sign-On URL and paste it in Mobilize Setup screen in SSO Target URL
- Copy Identity Provider Issuer and paste in Mobilize setup screen in Metadata url
- Download Certificate
- You will need to create a sha1 hash for the certificate.
- In osx open the terminal to where you downloaded the certificate
- And run openssl x509 -noout -fingerprint -sha1 -inform pem -in okta.cert
- Copy the output and pase it in fingerprints field in Mobilize setup
Comments
0 comments
Please sign in to leave a comment.