Skip to main content
Skip table of contents

Setting up Yotascale SSO with Okta using the SAML Auth provider

Currently Yotascale provides support for Google Auth, SAML (through Okta or Ping Identity) or Okta OpenID authentication in addition to username/password logins. Google Auth can be used alongside any 1 of the other Authentication Providers. Adding SAML or OpenID will override the username/password authentication. This guide focuses on setting up Okta as your IdP using Yotascale's SAML authentication provider.

Yotascale - Retrieve SAML Auth data:

  1. Login to Yotascale with a user account that has Admin Role access

  2. Go to the Settings Menu

  3. Under Users and Permissions select Manage Auth Providers

  4. Select "+ New Provider"

  5. Select “SAML”

  6. Enter an Organization name

    1. This is required in order to create the URLs.

  7. At bottom of page copy and save the SSO/ACS URL:  

    1. Example: https://login.yotascale.io/login/callback?connection=org_name

  8. Keep the page open

Okta - Create Application

  1. Login to Okta

  2. Select Applications

  3. Select "Create App Integration"

  4. In the popup view select “SAML 2.0”

  5. Click Next

  6. For App Integration Name enter a name: example: "Yotascale SAML"

  7. Add App logo if required

  8. Select Next

  9. You should be in the SAML Settings window

  10. For Single sign-on URL enter the saved data SSO/ACS URL from Yotascale

  11. Add these three attribute statements in the attribute section with Name Format "Unspecified":

    1. "email" set to "user.email"

    2. "firstName" set to "user.firstName" (optional)

    3. "lastName" set to "user.lastName" (optional)

  1. Click Preview the SAML Assertion to view the XML generated from the SAML settings (Optional)

  1. Click Next

  2. Select Finish

  3. Under Sign On tab for the new application

  4. Select "View Setup Instructions"

  5. Copy and save the Identity Provider Single Sign-On URL

  6. Copy and Download the X.509 Certificate

  1. Assign users/groups to the application

Yotascale - Complete SAML Auth Provider configuration

  1. You should still be logged in and on the SAML Auth Provider configuration page

  2. If not, login again to Yotascale with a user account that has Admin role access

  3. Follow the same steps to add a new SAML Auth provider as described above.

    • Make sure to add the same Organization name for SAML

  4. Enter the following information:

    1. Organization Name - make sure it is the same one entered earlier

    2. SSO URL - Enter the Identity Provider Single Sign-On URL from Okta Application recorded earlier

    3. IDP Certificate - Paste the X.509 Certificate from Okta Application recorder earlier

    4. Tenant domain - the domain name of your users that will be using Yotascale

    5. Auto Provisioning set to Enabled - When user authenticates through Okta, the user account will automatically be created in Yotascale User list.

    6. Active - set to Enabled

  5. Select “Add Auth Provider”

Configuration is now complete and users should be able to login via Okta successfully.

If you run into any issues, please contact our support team.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.