Knowlege base

SSO against OKTA Identity Provider

Article ID: 944
Last updated: 28 Sep, 2023

This article describes how to configure Okta to enable Imagicle users to login to web portal, gadgets and Attendant Console with Single Sign-on based on SAML protocol.


In order to successfully configure your Okta, you should have the following data:

  • User Pool ID
  • Redirect URI

More details available here.

Moreover, you must have a valid administrative account on your Okta production instance to perform the following configurations.


  1. Sign in to Okta portal, using your domain account with administrative rights.
  2. In the navigation menu, expand Applications, and then choose Applications.
  3. Choose Create App Integration.
  4. In the Create a new app integration menu, choose SAML 2.0 as the Sign-in method.
  5. Hit Next.

  1. Please enter an App name, like above "Imagicle UC Suite" and hit Next

  1. Compile above form with following data, leaving other fields with default values:
  • Single sign-on URL: Enter here the Redirect URI provided by Imagicle
  • Audience URI (SP Entity ID): Enter here the User Pool ID provided by Imagicle
  • Under Attribute Statements (optional), please enter:
    • Name
    • Name Format: Basic
    • Value:
  1.  At the bottom of this web page, you can click on "Preview the SAML Assertion" to trigger the pop-up of a new web panel including the SAML Assertion. Please verify that all data is consistent.
  2. Hit Next.
  3. Choose a feedback response for Okta Support.
  4. Choose Finish.

  1. The configuration is accomplished. 
  2. In "SAML Signing Certificates", please select View IdP metadata, available for the Active SHA-2 certificate.
  3. A new web window is displayed, including XML SAML certificate. Please save XML code as text file and send it to Imagicle Support team.
  4. Assign the new created App Integration to the relevant company users/groups that need to leverage the SSO (Applications > select the Imagicle app integration > Assignments).
Article ID: 944
Last updated: 28 Sep, 2023
Revision: 6
Views: 363
Print Export to PDF Subscribe Share
This article was:  
Prev   Next
SSO against Cisco Duo Identity Provider     SSO against MS-Azure Active Directory