Favicon

You are here: Home > Platform > Authentication > SSO > Okta

Okta

Enable Okta SAML SSO for Applivery. Securely connect your Applivery Dashboard, App Store, and MDM Portal using Okta credentials. Step-by-step guide.

10 min read

TL;DR

Configure Applivery SSO with Okta SAML by creating a SAML application in Okta and uploading the metadata to Applivery, enabling users to log in with their Okta credentials.

Warning

This is a premium feature that may not be available on your current plan. Check availability on the Applivery pricing page.

Once configured, your organization members will be able to log in to the Applivery Dashboard, App Store, or MDM Portal using their Okta credentials — no separate Applivery password required.

Warning

Okta does not support metadata file upload. Unlike other Identity Providers, Okta does not allow importing the Applivery pre-configured SAML Metadata XML file. You must configure the SAML application in Okta manually using the values provided in the Applivery dashboard. This guide covers the exact values to use for each portal type.

Note

If you plan to use a custom domain for your App Store or MDM Portal, configure it in Applivery before starting this guide. Custom domains change the callback URLs, so the order matters.


Prerequisites

  • Administrator access to your Applivery workspace.

  • Administrator access to your Okta Admin Portal.

  • Your Applivery organization slug — visible in the URL when logged into the Applivery Dashboard (e.g., demo in https://dashboard.applivery.io/demo/...).

  • If you are using a custom domain, make sure it is configured first in Applivery under the Settings section, then navigate to Store Customization from the left-hand menu.


1
Get the Service Provider values from Applivery

Applivery acts as the SAML Service Provider (SP). Since Okta requires manual entry, you need to collect two specific values from the Applivery SAML configuration screen.

Once in the Applivery Dashboard, go to your Workspace Settings from the top dropdown menu, then open Login providers in the left-hand menu. Find the SAML row and click Configure for the portal you want to protect — Dashboard, App Store, or MDM Portal.

login providers

Copy the following values:

Values by portal type

Dashboard

Field

Value

Single Sign-On URL (Callback URL)

https://dashboard.applivery.io/welcome/sso/{organization_slug}

Audience URI (SP Entity ID)

https://dashboard.applivery.com/sso/{organization_slug}/metadata.xml

App Store (Enterprise Store)

Field

Value

Single Sign-On URL (Callback URL)

Your App Store URL: {organization_slug}.applivery.io or your custom domain you.yourcompany.com

Audience URI (SP Entity ID)

https://dashboard.applivery.com/sso/{organization_slug}/metadata.xml

MDM Portal

Field

Value

Single Sign-On URL (Callback URL)

https://mdm-portal.applivery.io/login/{organization_id}

Audience URI (SP Entity ID)

https://dashboard.applivery.com/sso/{organization_slug}/metadata.xml

Replace {organization_slug} and {organization_id} with your actual values, visible in the Applivery SAML configuration screen.

2
Create a SAML application in Okta

Create a new App Integration

Log in to your Okta Admin Portal, go to Applications (inside Applications), and click the Create App Integration button.

create app integration

Select SAML 2.0 as the sign-on method, then click Next.

General settings

Enter a name for the application (e.g., Applivery), and optionally upload a logo for easy identification. Then click Next.

general settings

Configure SAML settings

Fill in the following fields on the SAML configuration screen:

Field

Value

Single sign-on URL

The Callback URL for your portal from Step 1

Audience URI (SP Entity ID)

The Entity ID for your portal from Step 1

Name ID format

EmailAddress

Application username

Email

saml settings

Leave all other fields at their default values.

Warning

The Single sign-on URL field must contain the Callback URL (not the general login URL). For example, for the Dashboard portal: https://dashboard.applivery.io/welcome/sso/demo.

Click Next when done.

Configure Group Attribute Statements

To enable Okta groups to be sent to Applivery (required for distribution group filtering and role mapping), you need to configure a Group Attribute Statement.

Scroll down to the Group Attribute Statements section. If it is collapsed, click Show Legacy Configuration → Edit.

Add a group claim with the following settings:

Field

Value

Name

http://schemas.microsoft.com/ws/2008/06/identity/claims/groups

Name format

URI Reference

Filter

See filter options below

Filter options — choose based on your needs:

Option

When to use

Starts with + a prefix

Send only groups whose names begin with a specific prefix. Useful for scoping which Okta groups are synced to Applivery.

Matches regex .*

Send all Okta groups the user belongs to.

Regex with a specific pattern

Send only groups matching a custom regular expression.

group attribute statement

Click Save to apply the attribute statement.

Complete the application setup

Finish the Okta wizard (click Next through any remaining steps). Okta will confirm the application has been created.

3
Get the Identity Provider metadata from Okta

Applivery needs Okta's Identity Provider metadata to validate incoming SAML assertions. Inside the newly created application in Okta, go to the Sign On tab, click View SAML Setup Instructions. Next, scroll to the bottom of the page and locate the Identity Provider metadata section. Copy the full XML content and save it as a .xml file (e.g., okta-metadata.xml).

view saml setup instructions
4
Complete the configuration in Applivery

Go back to the Applivery SAML configuration screen for the same portal you started with in Step 1.
Under Step 2 of the Applivery SAML form, upload the Federation Metadata XML file you saved from Okta and click Save. Use the toggle switch to enable the SAML integration for your organization.

5
Assign users in Okta

Before users can authenticate via SSO, they must be assigned to the Applivery application in Okta.

In your Okta application, go to the Assignments tab. Click Assign and select Assign to People or Assign to Groups, depending on your preferred access management approach. Assign the users or groups who should have access to Applivery and click Done.

assignments
Warning

Users who are not assigned to the application in Okta will not be able to log in via SSO, even if the integration is correctly configured.

6
Test the integration

Once both sides are configured and enabled, test with an assigned user:

  • Dashboard: Go to https://dashboard.applivery.io/welcome/sso and enter the user's email. You will be redirected to Okta for authentication.

  • App Store / MDM Portal: Navigate to your App Store or MDM Portal URL. Users with SAML configured will be redirected to Okta for authentication before accessing the portal.

If authentication fails, double-check that the Single Sign-On URL in Okta exactly matches the Callback URL from Applivery (including the organization slug), and that the user is assigned to the application in Okta.

Key Takeaways

  • Okta SAML configuration requires manual setup due to the lack of metadata file upload support.
  • The Single Sign-On URL (Callback URL) and Audience URI (SP Entity ID) must be correctly configured in Okta.
  • Group Attribute Statements are necessary to sync Okta groups to Applivery for distribution group filtering and role mapping.
  • The Identity Provider metadata from Okta must be uploaded to Applivery to complete the configuration.