Skip to main content

Set Up Single Sign-On (SSO) with Okta

Use this guide to configure Single Sign-On (SSO) using Okta as your Identity Provider (IdP) for secure login to Knak.

Updated over 2 weeks ago

Demo


Accessing the SSO Configuration in Knak

To begin setup:

  1. Go to Admin > Settings > Login.

  2. Locate the SSO section.

Login Settings UI

Provided Fields from Knak

These fields must be copied from Knak and added into your Okta SAML application:

Single Sign-On URL

  • This URL is used by Okta to send SAML assertions to Knak.

Audience URI

  • This identifies Knak as the intended recipient of the SAML assertion.

  • It ensures login attempts are valid for your organization.

IdP fields to update your SSO connection.

Required Fields in Knak

When configuring SSO in Knak, you must complete the following fields:

Identity Provider Single Sign-On URL (IdP SSO URL)

  • This URL is generated in Okta.

  • It is the endpoint Knak redirects to during the login process.

x509 Public Key Certificate

  • This is a public key from the Okta SAML application.

  • You must upload a valid .cer , .cert , or .pem certificate file in Knak.

Required fields for Knak for SSO configuration.

Click Save when finished.


Setting Up the SAML Application in Okta

Step 1: Create the Application

  1. In Okta, create a new SAML 2.0 application.

    New App creation UI in Okta.
  2. Name the application (e.g., "Knak").

    Create SAML Integration UI in Okta.

Step 2: Configure SAML Settings

In the SAML Settings section:

  1. Paste the Single Sign-On URL and Audience URI from Knak.

    1. Leave other settings as default unless instructed by IT.

Set the Application username format to Email.

SAML settings page in Okta with arrow pointing to "Application Username > Email"

Step 3: Retrieve IdP SSO URL and Certificate

  1. After saving the application, go to the app's Sign On tab.

  2. Click View SAML setup instructions.

    SAML Setup Instructions page.
  3. Copy the IdP SSO URL.

  4. Download the x509 Certificate.

    IdP SSO URL link and x509 Certificate file location.
  5. Paste the URL and upload the certificate in Knak.

  6. Press Save in Knak when finished. On success you'll see a Created New SAML Connection message on the top right corner.


Important Notes and Limitations

  • Users must be added to Knak manually. Okta cannot provision users automatically via IdP alone.

  • Knak supports SCIM for user provisioning. Follow this guide to set up SCIM with Okta.

  • Admins can choose whether users are required to log in via SSO or can also use a password. This can be adjusted in the Admin Settings under the Login tab. Toggle the Username and Password Login to Allow users to login using the Username and Password field on the Knak login page, toggle off to Force SSO Login for users.

Username and Password Login feature toggle.

Additional Resources

For general information on SAML and Okta setup, visit Okta’s SAML documentation.


Need more help? Contact support via live chat using the chat bubble in the bottom right corner or email support@knak.com.

Did this answer your question?