SAML SSO with Okta
Configure SAML SSO with Okta
This guide walks through setting up SAML single sign-on between Okta and Screendesk. After completing these steps, your team members can log in to Screendesk using their Okta credentials.
Plan Availability: Enterprise only
Before starting, make sure you have admin access to both the Okta Admin Console and your Screendesk workspace. You will also need your Screendesk service provider details — find them in Account Settings → Security → SAML SSO.
Configuration Overview
Setting up SAML SSO with Okta involves creating a SAML app integration in the Okta Admin Console, configuring the SAML settings, and then entering Okta's IdP details in Screendesk.
You will need these Screendesk values for the Okta side:
Single sign-on URL
https://app.screendesk.io/saml_callback
Audience URI (SP Entity ID)
urn:screendesk.io:saml
Step 1 — Create a SAML App Integration in Okta
Configure SAML settings
On the Configure SAML screen, enter the following:
General:
Single sign-on URL
https://app.screendesk.io/saml_callback
Use this for Recipient URL and Destination URL
Checked
Audience URI (SP Entity ID)
urn:screendesk.io:saml
Default RelayState
Leave blank
Name ID format
EmailAddress
Application username
Attribute Statements:
email
Unspecified
user.email
first_name
Unspecified
user.firstName
last_name
Unspecified
user.lastName
Click Next.
Copy the Okta IdP details
After the app is created, go to the Sign On tab and scroll down to the SAML Signing Certificates section. Find the active certificate and click Actions → View IdP metadata.
Alternatively, use the values shown under SAML 2.0 in the Sign On tab:
Sign on URL (or Identity Provider Single Sign-On URL) — Copy this. You will paste it as the Single Sign On URL in Screendesk.
Issuer (or Identity Provider Issuer) — Copy this. You will paste it as the IDP Entity ID in Screendesk.
Signing Certificate — Click Download certificate. You will paste its contents as the IDP Certificate in Screendesk.
You can also find these values by clicking View SAML setup instructions under the Sign On tab, which provides all three values on a single page.
Step 2 — Configure Screendesk
Enter the Okta IdP details
Using the values you copied from the Okta Admin Console in Step 1:
SSO Domain
Your company's email domain (e.g., yourcompany.com)
IDP Entity ID
The Issuer (Identity Provider Issuer)
Single Sign On URL
The Sign on URL (Identity Provider Single Sign-On URL)
IDP Certificate
The contents of the downloaded certificate file. Open it in a text editor and paste the full text, including the -----BEGIN CERTIFICATE----- and -----END CERTIFICATE----- lines.
Step 3 — Test the Connection
Optional — SCIM Provisioning with Okta
Okta supports SCIM 2.0 for automatic user provisioning. Once configured, Okta can create, update, and deactivate Screendesk user accounts based on app assignments.
Configure the SCIM connection
Go to the Provisioning tab and click Edit under SCIM Connection:
SCIM connector base URL
https://app.screendesk.io/api/v2/scim
Unique identifier field for users
userName
Supported provisioning actions
Push New Users, Push Profile Updates, Push Groups (optional)
Authentication Mode
HTTP Header
Authorization
The SCIM Token from your Screendesk SAML SSO settings
Click Test Connector Configuration to verify, then click Save.
Troubleshooting
"SAML Authentication failed" error
This usually means the SAML response signature could not be verified. Check the following:
The IDP Certificate in Screendesk matches the certificate downloaded from Okta. Make sure you pasted the full PEM text including header and footer lines.
The Single sign-on URL in Okta matches
https://app.screendesk.io/saml_callbackexactly.The Audience URI in Okta matches
urn:screendesk.io:samlexactly.Make sure the signing certificate in Okta is Active (not expired or inactive).
Okta shows "app not assigned" error
The user trying to log in has not been assigned to the Screendesk app in Okta. Go to the Assignments tab and add the user or their group.
Last updated
Was this helpful?