# Quick How-To guide setting up SSO with Okta

The IOIO supports SSO with various providers, in this guide we will follow all the steps that needs to be taken to integrate SSO with Okta.

Prerequisites:

  • Account in Okta
  • Admin account in IOIO
  1. Set up the iOiO roles in the Okta portal Each Okta user should have an assigned role with iOiO in order to login and use the iOiO portal. First you need to create a custom field in the Okta portal: Go to Directory -> Profile Editor -> Okta User Profile -> Add attribute You need to create a new attribute to store the user iOiO role:

    • Data type should be string
    • Variable name: ioio_role
    • the Enum flag to be selected. The attribute members are a list of iOiO role identifiers. You can get them from the iOiO platform -> Roles and Permissions Okta_Console
  2. Create new Application. Go to Applications -> Create App Integration and select SAML 2.0 Okta_Console General settings Fill in the name of the application and select Next Okta_Console

  3. SAML Settings. Single sign on URL: https://auth.ioio.tv/saml2/idpresponse Audience URI (SP Entity ID): urn:amazon:cognito:sp:us-east-1_LggtRKfi8 Okta_Console

  4. Attribute Statements Fill in the attributes as provided below name and value and click Add another

  • Name - Value http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress - user.email

  • Name - Value http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name - (user.firstName + " " + user.lastName)

    • Name - Value
    • role - user.ioio_role

    Please note that you can use your own fields to provide the information! (values of the attributes) Okta_Console

After that click Next and finish the configuration.

Please make sure that every person assigned to the iOiO application has an assigned iOiO role!

Finally you should provide iOiO with the Identity Provider metadata

Okta_Console

It is a URL to the Application metadata: Example: https://dev-88016059.okta.com/app/exk2k7vsnaXGYmklb5d7/sso/saml/metadata