Note: These domains must be linked to your community's current domain. If your domain updates or if you are using a custom domain- the new domain must be reflected here.
Log into your OKTA account
- Go to https://*******-admin.okta.com/admin/apps/active
- Click on Add Application
- Create a new app
- Select Platform Web and SAML 2.0
In the SAML Settings fill in the following fields:
Single Sign On URL **
https://<your-subdomain>.mobilize.io/users/auth/saml/callback
Note: [**]These domains must be linked to your community's current domain. If your domain updates or if you are using a custom domain- the new domain must be reflected here.
Audience URI (Restriction)
https://<your-subdomain>.mobilize.io/users/auth/saml/metadata
- In the assignments tab, make sure you added the member in the assignments
Go to Sign on tab
- View Setup Instructions
- Copy Identity Provider Single Sign-On URL and paste it in Mobilize Setup screen in SSO Target URL
- Copy Identity Provider Issuer and paste in Mobilize setup screen in Metadata URL
- Download Certificate
- You will need to create a sha1 hash for the certificate
- In osx open the terminal to where you downloaded the certificate
- And run openssl x509 -noout -fingerprint -sha1 -inform pem -in okta.cert
- Copy the output and paste it in the fingerprints field in Mobilize setup
- Fill in the Button Label Text box
- Click the Save Change button
Comments
0 comments
Please sign in to leave a comment.