Overview
You’ll complete these steps:- Get your OptiDev SSO settings
- Create a SAML app in Okta
- Configure the SAML settings
- Download the Okta certificate
- Enter Okta details in OptiDev
- Test the connection
Step 1: Get Your OptiDev SSO Settings
Before creating the Okta app, you need two values from OptiDev.Step 2: Create a SAML App in Okta
Step 3: Configure SAML Settings
On the “Configure SAML” screen, enter these values:General Settings
| Field | Value |
|---|---|
| Single sign-on URL | Paste your ACS URL from Step 1 |
| Audience URI (SP Entity ID) | Paste your SP Entity ID from Step 1 |
| Name ID format | EmailAddress |
| Application username | Email |
Attribute Statements
Add these three attribute mappings:| Name | Value |
|---|---|
email | user.email |
firstName | user.firstName |
lastName | user.lastName |
Step 4: Complete App Setup
On the feedback screen:- Select I’m an Okta customer adding an internal app
- Click Finish
Step 5: Get Okta Details for OptiDev
Now you need to copy values from Okta back to OptiDev.Open SAML Setup Instructions
On your new app’s page, click the Sign On tab, then click View SAML setup instructions.
Copy These Values
You’ll need three pieces of information:
| From Okta | What It’s Called |
|---|---|
| Identity Provider Single Sign-On URL | SSO URL |
| Identity Provider Issuer | Entity ID |
| X.509 Certificate | Certificate |
Step 6: Enter Okta Details in OptiDev
Enter IdP Configuration
Fill in the fields:
| Field | Value |
|---|---|
| Display Name | Okta (or your company name) |
| Entity ID | Paste the Identity Provider Issuer from Okta |
| SSO URL | Paste the Single Sign-On URL from Okta |
| Certificate | Paste the entire certificate content (including -----BEGIN CERTIFICATE-----) |
Add Your Email Domain
Enter your company’s email domain (e.g.,
yourcompany.com).All users with this email domain will be directed to Okta for login.Step 7: Assign Users in Okta
Before users can log in, you need to give them access to the app in Okta.Step 8: Test Your Setup
If you see your OptiDev dashboard, SSO is working. Your team can now log in with their Okta credentials.
Troubleshooting
Error: 'SAML assertion invalid'
Error: 'SAML assertion invalid'
- Double-check the ACS URL in Okta matches exactly what OptiDev shows
- Verify the certificate was copied completely (including BEGIN/END lines)
- Check that attribute names are lowercase (
email, notEmail)
Error: 'User not assigned'
Error: 'User not assigned'
- Go to your Okta app’s Assignments tab
- Make sure the user (or their group) is assigned to the OptiDev app
User redirected to wrong IdP
User redirected to wrong IdP
- Verify the email domain is correctly configured in OptiDev
- Check that only one SSO configuration exists for this domain
Login works but user has no access
Login works but user has no access
- The user account was created, but they need to be added to a workspace
- Go to Workspace Settings → Members and invite them