To configure SSO with Okta, you can use the available Postman app in Okta or create a custom SAML application. You must be an administrator in both Okta and Postman to configure SSO for your team.
Before configuring SSO in Okta, you must configure SSO in Postman. When choosing the Authentication Type, select Okta. Name your authentication and Continue.
To continue configuring SSO with Okta, choose one of the following:
It's recommended that you configure SSO with Okta using the Postman Okta app.
To continue configuring the Postman app in Okta, do the following:
Open your Okta admin console in a new tab.
Go to Applications, and then select Applications.
Select Browse App Catalog.
Search for "Postman". Select the Postman app from the results, and then select Add Integration.
In the General Settings screen, enter an application label you'll recognize later, and then select Done.
Select the Sign On tab, and then select Edit.
Take the Relay state generated from Postman and add it as your Default Relay State. Upload the Encryption Certificate downloaded from Postman. Take the ACS URL from Postman and add it to your configuration in Okta, and then select Save.
Select View SAML setup instructions to display SAML configuration instructions, including the identity provider (IdP) details.
In Postman, enter the SSO URL, Identity provider issuer, and X.509 Certificate individually under Identity provider details.
Select Save Authentication in Postman.
To continue configuring your custom SAML application, do the following:
You can't use a custom SAML app to configure SCIM provisioning through Okta.
Open your Okta admin console in a new tab.
Go to Applications, and then select Applications.
Select Create App Integration.
In the Create a new app integration screen, select SAML 2.0 and then select Next.
In the General Settings tab, enter an app name you'll recognize later, and then select Next.
In the Configure SAML tab, take the ACS URL from Postman and add it as your Single sign-on URL. Take the Entity ID from Postman and add it as your Audience URI (SP Entity ID). Take the Relay state generated from Postman and add it as your Default RelayState. Select EmailAddress as the name ID format.
Select Show Advanced Settings. Select Encrypted as the assertion encryption, AES128-CBC as the encryption algorithm, and RSA-1.5 as the key transport algorithm. Upload the Encryption Certificate downloaded from Postman, and then select Next.
In the Feedback tab, select I'm an Okta customer adding an internal app. Select This is an internal app that we have created as the app type, and then select Finish.
Select the Sign On tab, and then select View SAML setup instructions to display the IdP details.
In Postman, enter the SSO URL, Identity provider issuer, and X.509 Certificate individually under Identity provider details.
Select Save Authentication in Postman.
Now that you've set up SSO with Okta using the Postman app, you can learn about setting up SCIM provisioning:
Last modified: 2023/01/19