Skip to main content

Integration for Okta SSO

Written by Hyperproof Support
Updated over 3 weeks ago

πŸ“ Note

This option pertains to the Hyperproof TPRM product line.


The integration for Ijta SSO offers robust features for managing users and groups.


πŸ“ Note

Use the Disable button at the top of the window to deactivate the integration when needed.


When you select Okta SSO from the Settings > Integrations page, Hyperproof TPRM displays step-by-step instructions to integrate with Okta SSO.

  1. Create a SAML App in Okta

    • Open the Okta Admin console.

    • From the left menu, select Applications > Applications.

    • Click Create App Integration.

    • In the pop-up window, set the Sign-on Method to SAML 2.0.

    • Click Next.

  2. Configure SAML Integration for Your Okta App

    • On the Create SAML Integration page:

      • Under General Settings, set the App Name to Expent-SSO.

      • Select the following checkboxes under App Visibility:

        • Do not display application icon to users

        • Do not display application icon in the Okta Mobile app

      • Click Next.

    • On the Configure SAML tab:

      • For Single Sign-On URL, enter:

        https://expent-okta-c3cnuph2seajun8i1nvg.auth.us-east-1.amazoncognito.com/saml2/idpresponse

      • For Audience URI (SP Entity ID), enter:

        urn:amazon:cognito:sp:us-east-1_eRTFGToAD

      • Under SAML Settings:

      • Under ATTRIBUTE STATEMENTS (OPTIONAL) add a new entry with the following information:

        • Name

          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress

        • Value

          user.email

      • Leave all other settings at their defaults or adjust them to your preferences.

      • Click Next.

    • Choose a feedback response for Okta Support:

      • Select I'm an Okta customer adding an internal app.

      • Leave other fields with their default values.

      • Click Finish.

  3. Assign Users or Groups

    • Navigate to the Assignments tab.

    • Assign individual users or groups to the Expent-SSO app using the Assign button on the top left.

  4. Get the IdP Metadata for the Okta Application - On the Sign On tab of the Okta app:

    • Find the Identity Provider metadata hyperlink.

    • Right-click the hyperlink and copy the URL.

  5. Return to the Okta SSO integration window in Hyperproof TPRM.

    • Paste the URL copied in the previous step into the Identity provider metadata hyperlink field.

    • Click Submit to complete the configuration.

Did this answer your question?