Overview
You’ll complete these steps:- Get your OptiDev SSO settings
- Create a SAML app in Okta
- Configure the SAML settings
- Download the Okta certificate
- Enter Okta details in OptiDev
- Test the connection
Step 1: Get Your OptiDev SSO Settings
Before creating the Okta app, you need two values from OptiDev.1
Open SSO Settings
In OptiDev, go to Workspace Settings → Security → Single Sign-On.
2
Copy Your Values
You’ll see two important values. Keep this page open — you’ll need these shortly.
| Setting | Example |
|---|---|
| SP Entity ID | https://auth.optiprime.com/saml/abc123 |
| ACS URL | https://auth.optiprime.com/saml/abc123/acs |
Step 2: Create a SAML App in Okta
1
Open Okta Admin Console
Log in to your Okta admin console at
https://your-domain-admin.okta.com.2
Go to Applications
In the sidebar, click Applications → Applications.
3
Create New App
Click Create App Integration.
4
Select SAML 2.0
Choose SAML 2.0 and click Next.
5
Name Your App
Enter OptiDev as the app name. Optionally upload the OptiDev logo. Click Next.
Step 3: Configure SAML Settings
On the “Configure SAML” screen, enter these values:General Settings
| Field | Value |
|---|---|
| Single sign-on URL | Paste your ACS URL from Step 1 |
| Audience URI (SP Entity ID) | Paste your SP Entity ID from Step 1 |
| Name ID format | EmailAddress |
| Application username | Email |
Attribute Statements
Add these three attribute mappings:| Name | Value |
|---|---|
email | user.email |
firstName | user.firstName |
lastName | user.lastName |
Step 4: Complete App Setup
On the feedback screen:- Select I’m an Okta customer adding an internal app
- Click Finish
Step 5: Get Okta Details for OptiDev
Now you need to copy values from Okta back to OptiDev.1
Open SAML Setup Instructions
On your new app’s page, click the Sign On tab, then click View SAML setup instructions.
2
Copy These Values
You’ll need three pieces of information:
| From Okta | What It’s Called |
|---|---|
| Identity Provider Single Sign-On URL | SSO URL |
| Identity Provider Issuer | Entity ID |
| X.509 Certificate | Certificate |
3
Download the Certificate
Click to download the certificate. Open it in a text editor — you’ll paste the contents into OptiDev.
Step 6: Enter Okta Details in OptiDev
1
Return to OptiDev SSO Settings
Go back to Workspace Settings → Security → Single Sign-On.
2
Enter IdP Configuration
Fill in the fields:
| Field | Value |
|---|---|
| Display Name | Okta (or your company name) |
| Entity ID | Paste the Identity Provider Issuer from Okta |
| SSO URL | Paste the Single Sign-On URL from Okta |
| Certificate | Paste the entire certificate content (including -----BEGIN CERTIFICATE-----) |
3
Add Your Email Domain
Enter your company’s email domain (e.g.,
yourcompany.com).All users with this email domain will be directed to Okta for login.4
Save Configuration
Click Save to enable SSO.
Step 7: Assign Users in Okta
Before users can log in, you need to give them access to the app in Okta.1
Go to Assignments
In Okta, open your OptiDev app and click the Assignments tab.
2
Assign Users or Groups
Click Assign and choose:
- Assign to People — for individual users
- Assign to Groups — for entire teams or departments
Step 8: Test Your Setup
1
Open an Incognito Window
Use a private/incognito browser window to avoid cached sessions.
2
Go to OptiDev
Visit
https://app.optidev.ai and click Sign in with SSO.3
Enter Your Email
Enter your company email address. You should be redirected to Okta.
4
Log In
Sign in with your Okta credentials. You should land in OptiDev.
If you see your OptiDev dashboard, SSO is working. Your team can now log in with their Okta credentials.
Troubleshooting
Error: 'SAML assertion invalid'
Error: 'SAML assertion invalid'
- Double-check the ACS URL in Okta matches exactly what OptiDev shows
- Verify the certificate was copied completely (including BEGIN/END lines)
- Check that attribute names are lowercase (
email, notEmail)
Error: 'User not assigned'
Error: 'User not assigned'
- Go to your Okta app’s Assignments tab
- Make sure the user (or their group) is assigned to the OptiDev app
User redirected to wrong IdP
User redirected to wrong IdP
- Verify the email domain is correctly configured in OptiDev
- Check that only one SSO configuration exists for this domain
Login works but user has no access
Login works but user has no access
- The user account was created, but they need to be added to a workspace
- Go to Workspace Settings → Members and invite them