Before getting started, checking out our SSO Configuration overview to learn more about our general SSO settings.
In the main Dashboard of your Okta account, select
In the application catalog, click
Create New App.
In the following dialog, leave
Web selected and pick
SAML 2.0 as the sign on method.
General Settings, provide, at minimum, a name.
Single Sign On URL is constructed with the
URL Fragment configured in your SSO configuration. The single sign on URL would follow the format:
Audience URI follows the same format as the
Single Sign On URL, but changing
metadata, such as
Lastly as Panopta uses the email address as the base for identifying your user. Set the
Name ID format as
Application username as
optional attribute statements, set the following three fields:
On the Feedback tab, check
I'm an Okta customer adding an internal app.
You should be taken to an page detailing the Panopta application we just created. Click
View Setup instructions.
Utilize the data in this screen to complete the General section of your Panopta SSO Configuration.
Identity Provider Single Sign-On URL is the
Identity Provider Issuer is the
The certificate must be copied in Certificate
input, under the Certificates section
Login binding must be filled with
Lastly, assign any user you want to access the Panopta app in Okta. Go to the assignment tab in the Application page and click Assign.
Search for people you want to be able to login into Panopta.