Okta SSO
This guide walks you through setting up SAML Single Sign-On between Okta and Probo.
Prerequisites
Section titled “Prerequisites”- Okta administrator access
- Probo organization administrator access
- Your Probo domain (e.g.,
probo.example.com) - Access to your DNS settings for domain verification
Prepare Probo Information
Section titled “Prepare Probo Information”Before configuring Okta, gather these Probo service provider details:
| Field | Value |
|---|---|
| ACS URL | https://your-probo-domain.com/auth/saml/acs |
| Entity ID | https://your-probo-domain.com/auth/saml/metadata |
Replace your-probo-domain.com with your actual Probo domain.
Domain Verification
Section titled “Domain Verification”Before configuring anything else, you must verify domain ownership:
- Log in to Probo as an organization administrator
- Go to Organization Settings → Authentication → SAML
- Click Verify Domain (if no configurations exist yet, this option will be available)
- Copy the provided TXT record value
- Add a TXT record to your domain’s DNS settings:
Type: TXTName: _probo-domain-verification.your-company.comValue: [Verification token from Probo]TTL: 300 (or your DNS provider's default)
- Wait for DNS propagation (usually 5-15 minutes)
- In Probo, click Complete Verification
- If successful, the domain status will show as “Verified”
Configure Okta
Section titled “Configure Okta”-
Sign in to your Okta Admin Console
-
Go to Applications → Applications
-
Click Create App Integration
-
Select SAML 2.0
-
Click Next
-
Configure the general settings:
Field Value App name ProboApp logo Upload Probo logo (optional) App visibility Check desired options -
Click Next
-
Configure the SAML settings:
Field Value Single sign on URL https://your-probo-domain.com/connect/saml/consumeUse this for Recipient URL and Destination URL ☑️ (Check this box) Audience URI (SP Entity ID) https://your-probo-domain.com/connect/saml/metadataDefault Relay State [SAML Configuration ID](optional - see note below)Name ID format EmailAddressApplication username EmailImportant: The Default Relay State is optional but if you want to support IdP-initiated login flows, it MUST be set to your exact SAML configuration ID (not a placeholder). If set incorrectly, SSO will not work. You’ll get this ID after creating the SAML configuration in Probo. You can initially leave this empty and update it later with the exact configuration ID.
-
Add the following attribute statements:
Name Name format Value emailUnspecified user.emailfirstNameUnspecified user.firstNamelastNameUnspecified user.lastNameroleUnspecified user.role(optional) -
Click Next
-
Select I’m an Okta customer adding an internal app
-
Set App type to: Internal app for employees
-
Click Finish
-
Go to the Sign On tab of your Probo app
-
Click View SAML setup instructions
-
Save these values for Probo configuration:
- Identity Provider Single Sign-On URL
- Identity Provider Issuer
- X.509 Certificate
-
Go to the Assignments tab
-
Click Assign → Assign to People or Assign to Groups
-
Select users/groups that should have access to Probo
-
Click Assign and Done
Configure Probo
Section titled “Configure Probo”-
Log in to Probo as an organization administrator
-
Go to Organization Settings → Authentication → SAML
-
Click Add SAML Configuration
-
Configure the basic settings:
Field Value Notes Email Domain your-company.comYour organization’s email domain Enforcement Policy OPTIONALRecommended for initial setup -
Configure the Identity Provider settings with values from Okta:
Field Value Notes IdP Entity ID [Identity Provider Issuer]Copy from Okta setup IdP SSO URL [Identity Provider Single Sign-On URL]Copy from Okta setup IdP Certificate [X.509 Certificate]Copy from Okta setup -
Configure the attribute mappings:
Field Value Notes Email Attribute emailMaps to user email First Name Attribute firstNameMaps to user first name Last Name Attribute lastNameMaps to user last name Role Attribute roleIf configured in Okta -
Configure user settings:
Field Value Notes Auto Signup EnabledAllows new users to sign up automatically via SSO -
Click Save Configuration
-
Copy the SAML Configuration ID that appears after saving (e.g.,
saml_config_1a2b3c4d)
Update Okta Relay State
Section titled “Update Okta Relay State”Return to Okta to enable IdP-initiated login:
- Go to your Probo app in Okta Admin Console
- Click General tab → Edit SAML Settings
- In the Default Relay State field, enter your SAML configuration ID
- Click Next → Next → Finish
Troubleshooting
Section titled “Troubleshooting””SAML assertion audience mismatch” Error
Section titled “”SAML assertion audience mismatch” Error”- Cause: Audience URI mismatch between Okta and Probo
- Solution: Ensure Audience URI in Okta exactly matches your Entity ID:
- Should be:
https://your-probo-domain.com/connect/saml/metadata
- Should be:
”User not assigned to application” Error
Section titled “”User not assigned to application” Error”- Cause: User not assigned to Probo app in Okta
- Solution: Assign user to the application in Okta’s Assignments tab
Attributes Not Mapping
Section titled “Attributes Not Mapping”- Cause: Incorrect attribute statement names in Okta
- Solution: Verify attribute statement names match exactly:
email,firstName,lastName
”Invalid RelayState” Error
Section titled “”Invalid RelayState” Error”- Cause: Incorrect Default Relay State configuration
- Solution: Ensure Default Relay State is either empty or set to the exact SAML configuration ID from Probo
Debugging Steps
Section titled “Debugging Steps”Check Okta System Log
Section titled “Check Okta System Log”- Go to Okta Admin Console → Reports → System Log
- Filter by application name (Probo)
- Look for authentication failures and error details
Advanced Configuration
Section titled “Advanced Configuration”Custom Attributes
Section titled “Custom Attributes”To map additional Okta user attributes:
- In Okta, add custom attributes to user profiles
- Add attribute statements in the SAML app configuration
- Map these attributes in Probo SAML configuration
Group-Based Access
Section titled “Group-Based Access”Control access using Okta groups:
- Create groups in Okta for Probo access
- Assign users to appropriate groups
- Assign the Probo app to groups instead of individual users
- Use group filters for fine-grained access control
For detailed troubleshooting and advanced configuration options, see the SSO Overview guide.