Developer Portal 10.11 | Using Developer Portal | User management | Single Sign-On Users Onboarding | SAML SSO Onboarding | How do I onboard users using their SAML service provider credentials?
 
How do I onboard users using their SAML service provider credentials?
You can enable SSO using one of the following applications:
*Okta
*PingIdentity
*Azure
This use case begins when you want to allow users to onboard using their SSO credentials and ends when you have completed the configuration.
In this example, you enable SSO for user with their Okta credentials.
Before you begin:
Ensure that you:
*Enable SAML. You can enable SAML by turning the SAML active slider on.
SAML enabling option
*Create an application in Okta to register the service provider application (Developer Portal) in the Okta, and keep the Identity Provider Single Sign-on URL and Identity Provider Issuer values ready. For information on creating an application in Okta, see https://developer.okta.com/docs/guides/add-an-external-idp/apple/register-app-in-okta/.
*To enable SSO onboarding using Okta credentials:
1. Click the menu options icon from the title bar and click Administration.
2. Select SAML.
3. Select Redirect from the Binding list.
4. Provide the following values copied from Okta SSO application that you created for Developer Portal:
*Identity provider Id. Id of the identity provider.
*Service provider Id. Id of the service provider. This must be same as the value you specify in Okta.
*Single sign-on endpoint and Single logout endpoint. Endpoints that the identity provider must use to send single sign-on and logout payloads.
5. Click Save.
Your changes are saved.
Alternative steps:
*Enable SSO to allow users to sign in to Developer Portal using their PingIdentity or Azure AD credentials.
You must create an application in Okta to register the service provider application (Developer Portal) in the required service provider and provide the Identity Provider Single Sign-on URL and Identity Provider Issuer values in the SAML section:
*For information on creating an application in PingIdentity, see https://docs.pingidentity.com/bundle/integrations/page/che1563995024790.html.
*For information on creating an application in Azure Active Directory, see https://docs.microsoft.com/en-us/azure/active-directory/develop/quickstart-register-app.
Next steps:
*The Sign in with SSO button appears in the Sign in page.
User can click this button, provide their Okta credentials to sign up to Developer Portal. The sign up request goes through the onboarding strategy.
*Configure advanced SAML settings. For information on configuring advanced SAML settings, How do I configure SAML settings to specify user onboarding configurations?.