Skip to content

Okta and SAML🔗

This document covers step two of the Single sign-on (SSO) setup process, and shouldn't be completed independently.

  1. Log in to Okta, click Applications in the left menu, then select Applications again from the expanded menu.

    Okta applications

  2. Click the Create App Integration button at the top.

    Create App Integration

  3. Select the SAML 2.0 radio buttonas the sign-on method.

    Select SAML method

  4. Enter a name for the application, such as Matillion SSO, tick Do not display application icon to users, and click Next.

    Application name

    Note

    There are optional steps at the end of this document if you wish to add an icon for users. The icon for the application itself must always be hidden, as using it will attempt an IdP Initiated connection which we do not allow for security reasons.

  5. Enter the following:

    • Single sign on URL: https://id.matillion.com/login/callback.
    • Audience URI (SP Entity ID): urn:auth0:matillion:[domain]-saml replacing [domain] with your primary email domain, and converting any special characters to dashes. For instance example.com would become urn:auth0:matillion:example-com-saml.
    • Leave the other fields blank, and click Next.

    Configure SAML

    Note

    The Relay State will be provided by Matillion later, and will be added here before testing. No other configuration should be changed at that stage.

  6. Ensure the Application username is mapped to a value that is unique to each user and immutable.

    Application username

    Warning

    The default value, Okta username, is usually an email address and should not be used. The value chosen here is used internally by the identity provider as the NameID to uniquely identify users. It is never visible in either system, and users will always sign in using their email address regardless of this setting.

    Leaving the default value unchanged can cause problems if it is modified in the future. If that happens, Matillion will treat the user as a new account, which results in the loss of the original user profile.

    Any value that is unique to each user and guaranteed to remain unchanged can be used. Because every configuration is different, Matillion cannot provide guidance on creating a unique attribute in Okta. However, you can verify the exact value being sent during the testing phase, before the configuration is activated and impacts user logins.

  7. Add the following five entries in the Attribute Statements (optional) section:

    Attribute statements

    The email_verified attribute ensures that users aren't prompted to verify their email address with Matillion.

  8. Scroll down to the bottom, and click Next.

    Finish setup

  9. If requested, complete the Okta feedback form, and click Finish.

  10. Ensure the Sign On tab is open.

    Sign On tab selected

  11. Click More details, click the Copy button under Sign on URL, and make a note of this for later.

    Copy Sign on URL

  12. Scroll down to the bottom of the page, click on the Actions menu next to the Active certificate, and click Download certificate.

    Download certificate

    Note

    This is not the same as the signing certificate available for download above.

  13. Open the Assignments tab, click Assign, and follow the prompts to assign users or groups to the application as needed.

    Assignments tab

  14. Continue the steps in Single sign-on (SSO) setup.

    Note

    Optional: Follow the steps in configure an Okta application icon so users can access Matillion from their Okta dashboard. If you don't require an application icon, skip this section and continue with Single sign-on (SSO) setup.


Configure an Okta application icon (optional)🔗

  1. Click Applications.

    Applications menu

  2. Click Browse App Catalog.

    Browse App Catalog

  3. Enter bookmark in the search field, and click Bookmark App.

    Bookmark App

  4. Click Add Integration.

    Add Integration

  5. Enter an Application label and the URL https://app.matillion.com.

    Application label and URL

  6. Select the bookmark from the list of applications, which will be shown with a star icon.

    Select bookmark

  7. Click on the icon.

    Click icon

  8. Upload an icon for the application, such as matillion.png. Note from Jay: can we make this a link to the attached matillion logo without showing the actual image in the doc?

    Upload icon

  9. Continue the steps in Single sign-on (SSO) setup.

Got feedback or spotted something we can improve?

We'd love to hear from you. Join the conversation in the Documentation forum!