# Enforce SAML-based SSO authentication for Okta

This guide demonstrates how to set up SAML-based SSO authentication for Workflow apps using Okta. It includes instructions for enabling user groups syncing between Workflow apps and Okta, allowing you to manage access to specific Workflow apps through your Identity Provider (IdP).

DEFAULT SESSION DURATION

The default session duration is five minutes when you authenticate using SAML-based SSO. You can extend the session duration by customizing the SessionNotOnOrAfter parameter. Refer to the Create an app integration section to learn more.

# Prerequisites

To complete the steps in this guide, you must have the following:

In Workato:

In Okta:

  • Privileges that enable you to add, edit, and manage an app integration.
  • Privileges that enable you to create users and groups, assign users to groups, and assign users and groups to applications.

# Step 1: Create an app integration

1

Sign in to your Okta (opens new window) account.

2

Navigate to Applications > Applications and click Create App Integration.

Add application in Okta Add application in Okta

Refer to the Okta documentation (opens new window) for more information.

3

Select SAML 2.0 as the Sign-in method.

Create a new application in Okta Create a new application in Okta

4

Provide a unique App name in the General settings tab. For example, Workflow apps.

5

Click Next.

6

Optionally, upload an App logo and determine the visibility of this app to your end users.

7

Click Next.

8
Enter your Single Sign-On URL
1

In Workato, go to Platform > Workflow apps portal > Settings > Security.

2

Copy and paste the Single Sign-On URL into its corresponding field in Okta.

SSO URL FORMAT VARIES

The Single Sign-On URL (SSO URL) format varies and is unique to your Apps portal subdomain/domain and the data center in which your account is located.

If you are using the default domain, the Single Sign-On URL follows this format:

https://{subdomain}.workato.app/portal/sso/saml/acs

Where {subdomain} is your portal's subdomain.

If you are using a custom domain, the Single Sign-On URL follows this format:

https://{custom-domain}/portal/sso/saml/acs

Where {custom-domain} is your custom domain name.

9

Select Use this for Recipient URL and Destination URL.

10
Enter your Audience URI (SP Entity ID)
1

In Workato, go to Platform > Workflow apps portal > Settings > Security.

2

Copy the Service provider (SP) entity ID and paste it into the Audience URI (SP Entity ID) field in Okta.

AUDIENCE URI (SP ENTITY ID) FORMAT VARIES

The Audience URI (SP Entity ID) format varies and is unique to your Apps portal subdomain/domain and the data center in which your account is located.

If you are using the default domain, the Audience URI (SP Entity ID) follows this format:

https://{subdomain}.workato.app/portal/sso/saml/metadata

Where {subdomain} is your portal's subdomain.

If you are using a custom domain, the Audience URI (SP Entity ID) follows this format:

https://{custom-domain}/portal/sso/saml/metadata

Where {custom-domain} is your custom domain name.

11

Select EmailAddress as the Name ID format.

12

Set the Application username to Custom and enter the following expression. This expression converts the user email to lowercase:

toLowerCase(user.email)

Set Application username to CustomSet the Application username to Custom

13

Optionally, you can customize the session duration. Otherwise, the default session timeout is five minutes.

Customize the session duration
1

Click Advanced options.

2

In the Maximum app session lifetime field, select the Send value in response checkbox.

3

Specify the maximum app session lifetime. For example, enter 10 minutes. This is the new session timeout duration. The maximum limit is 90 days.

Customize session timeoutCustomize session timeout

14
Assign Attribute Statements to your App Integration
1

In the Attribute Statements section, add the following attribute statements:

Name Value
Attribute 1 workato_app_user_name user.displayName
Attribute 2 workato_app_user_groups appuser.workato_app_user_groups

The resulting attribute statements should look like this:

Attribute StatementsAdd Attribute Statements to your App

15

Click Next.

16

Optionally, provide feedback to Okta on how you used this interface and click Finish.

# Step 2: Configure Okta SAML user groups sync

When using Okta as your identity provider (IdP), you can sync user groups configurations. This section of the guide demonstrates how to configure Okta to sync with user group assignments in Workflow apps.

This step involves the following tasks:

  1. Configure user groups
  2. Set up a custom attribute for groups
  3. Assign groups to the app
  4. Verify the SAML assertion

# Configure user groups

If you already have user groups configured in Okta, you can skip the following instructions and proceed to Set up a custom attribute for groups.

1

In Okta, navigate to Directory > People and click + Add person.

2

Provide the user's details and click Save. Alternatively, you can select Save and Add another to add additional users.

3

Go to Directory > Groups and click + Add group to add groups to your Okta instance.

4

Add one or more groups. For example, you might create one group named Managers and another named Members.

5

Select a group, such as Managers.

6

Click Assign people and select the users you plan to add to this group.

Assign users to groupsAssign users to groups

# Set up a custom attribute for groups

1

Go to Directory > Profile editor > {App name} User and click + Add Attribute.

2

Select string array as the Data type.

Add attributeAdd attribute

3

Enter Workato app user groups as the Display name.

4

Enter workato_app_user_groups as the Variable name.

5

Select Group as the Attribute type.

6

Optionally, set the Group priority to Combine values across groups.

7

Click Save.

# Assign groups to the app

Complete the following steps to assign your Okta groups to your app. This process involves assigning a custom attribute to your groups.

1

In Okta, go to Applications > Applications and select your app.

2

Click Assignments > Assign and select Assign to groups.

Assign groups to this appClick assign to select the groups to assign to this app

3

Select the group you plan to assign.

4

Next to the Workflow app user groups, click Add another and enter a group name from your Workflow apps portal. This syncs group assignments between Okta and the Workflow apps portal, ensuring that this Okta group has the app access afforded to the group you specify. In this example, we've assigned Members to the Sales group.

Assign apps groups to okta groupsAssign groups

GROUPS MUST EXIST IN APPS PORTAL

The user group must already exist in Workato to assign it to your Okta groups.

5

Optionally, click Add another to assign one or more additional groups.

6

Click Save and go back, and then click Done.

7

Assign additional Okta groups to this application as required.

# Verify the SAML assertion

Complete the following steps to ensure that SAML SSO is set up correctly. In this step, we preview the SAML assertion sent between apps to enforce SAML SSO.

1

Go to Applications > Applications and select your app.

2

In the General tab, go to SAML Settings and click Edit.

3

Navigate to Configure SAML and click Preview SAML assertion.

4

Review the generated assertion. This assertion should contain the Attribute Statements you created in the preceding steps. For example:

View preview assertion
 <saml2:AttributeStatement>
        <saml2:Attribute Name="workato_app_user_name" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified">
            <saml2:AttributeValue
                xmlns:xs="http://www.w3.org/2001/XMLSchema"
                xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">
            </saml2:AttributeValue>
        </saml2:Attribute>
        <saml2:Attribute Name="workato_app_user_groups" NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:unspecified">
            <saml2:AttributeValue
                xmlns:xs="http://www.w3.org/2001/XMLSchema"
                xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">managers
            </saml2:AttributeValue>
        </saml2:Attribute>
    </saml2:AttributeStatement>

# Step 3: Complete setup in Workato

1

In Workato, go to Platform > Workflow apps portal > Settings > Security.

2

In the Authentication method field, select SAML based SSO.

Workato SAML setupWorkato SAML setup

3

Provide metadata from your IdP. In the Do you have your identity provider metadata URL field, select Yes or No.

4

In the Enforce SAML authentication for field, decide whether to enforce SAML authentication for all Workflow apps users or only specific domains.

Users outside those domains can sign in using password authentication. This approach is useful for complying with organizational SSO policies while allowing external users without an identity provider account to access Workflow apps.

5

Optionally, click Enable JIT (Just-In-Time) provisioning to automatically add users to the portal after identity provider authentication.

When JIT is enabled, any user signing in to Workato through SSO for the first time is automatically added to the portal.

6

Click Enable user groups syncing to sync user groups from your IdP. This step is mandatory if you plan to manage user groups through your IdP.

If you plan to enable user groups syncing

If you completed all instructions in Step 1: Create an app integration, this process is already complete.

1

Specify the following SAML attributes in Okta:

Name Value
Attribute 1 workato_app_user_name user.displayName
Attribute 2 workato_app_user_groups appuser.workato_app_user_groups
7

Optionally, customize the session duration for the Apps portal by modifying the SessionNotOnOrAfter attribute in Okta. Otherwise, the default session timeout is five minutes.

If you completed all instructions in Step 1: Create an app integration, this process is already complete.

8

Click Save changes.


Last updated: 1/8/2025, 5:37:34 PM