Skip to main content
Version: 1.0

Okta SSO Setup

This guide walks through configuring SAML 2.0 single sign-on between Okta and SyVault. You will need Okta admin access and SyVault Owner or Admin privileges.

Prerequisites

  • SyVault organization on a Business or Enterprise plan
  • Okta admin account with permission to create applications
  • Your SyVault organization slug (found in Admin Console > Settings)

Step 1: Create a SAML Application in Okta

  1. Log in to the Okta Admin Console.
  2. Navigate to Applications > Applications > Create App Integration.
  3. Select SAML 2.0 and click Next.
  4. Enter the following on the General Settings page:
    • App Name: SyVault
    • App Logo: (optional) upload the SyVault logo
  5. Click Next to proceed to SAML configuration.

Step 2: Configure SAML Settings

On the Configure SAML page, enter the following values:

FieldValue
Single sign-on URLhttps://api.syvault.com/api/auth/saml/acs
Audience URI (SP Entity ID)syvault:<your-org-slug> (e.g., syvault:acme-corp)
Default RelayStateLeave blank
Name ID formatEmailAddress
Application usernameOkta username (email)

Under Attribute Statements, add:

NameValue
emailuser.email
firstNameuser.firstName
lastNameuser.lastName

Click Next, select "I'm an Okta customer adding an internal app", and click Finish.

tip

Double-check the Entity ID format. It must be exactly syvault:<your-org-slug> with no trailing slashes or spaces. A mismatched Entity ID is the most common cause of SSO configuration failures.

Step 3: Download IdP Metadata

  1. On the application page, click the Sign On tab.
  2. In the SAML Signing Certificates section, find the active certificate.
  3. Click Actions > View IdP metadata. This opens the metadata XML in a new tab.
  4. Copy the URL from the browser address bar -- this is your IdP Metadata URL.

Alternatively, click Actions > Download metadata to save the XML file locally.

Step 4: Configure SyVault

  1. Open the SyVault Admin Console > SSO & SCIM > SAML SSO.
  2. Paste the IdP Metadata URL or upload the downloaded metadata XML file.
  3. SyVault will automatically extract:
    • IdP SSO URL
    • IdP Issuer / Entity ID
    • X.509 signing certificate
  4. Verify the extracted values look correct.
  5. Click Save Configuration.

Step 5: Assign Users and Groups

Back in the Okta Admin Console:

  1. Navigate to the SyVault application's Assignments tab.
  2. Click Assign > Assign to People or Assign to Groups.
  3. Select the users or groups who should have SSO access to SyVault.
  4. Click Save and Go Back when done.
warning

Only users who are also members of your SyVault organization can complete SSO login. Assigning a user in Okta who has not been invited to SyVault will result in a login error. Use SCIM provisioning to automate member creation when users are assigned in Okta.

Step 6: Test SSO Login

  1. In the SyVault Admin Console, click Test Connection. This opens a new browser window, sends a SAML AuthnRequest to Okta, and verifies the response.
  2. If the test succeeds, you will see a green confirmation message with the authenticated email address.
  3. Try a full login: open a private/incognito browser window, go to the SyVault login page, click Login with SSO, enter your organization slug, and authenticate through Okta.

Troubleshooting

SymptomLikely CauseFix
"Invalid audience" errorEntity ID mismatchVerify the Audience URI in Okta matches syvault:<org-slug> exactly
"Signature validation failed"Certificate mismatch or rotationRe-download the IdP metadata and re-upload to SyVault
"User not found" errorUser not a SyVault memberInvite the user to SyVault or enable SCIM provisioning
Redirect loopRelayState issueEnsure Default RelayState is blank in Okta
"Clock skew" errorServer time mismatchEnsure your Okta tenant and SyVault server clocks are within 5 minutes