Important Notes
This is an organization-wide change that affects how all users sign in. Before proceeding, please note:
All users will need to sign in using Okta
The Okta email must match the user's email in AutoRFP
Password-based login will be disabled after SSO is enforced
Setting Up SSO
Go to User Settings and click "Enforce SSO".
Choose Okta as the Provider
Click "Configure" to get started.
Prepare for Configuration
In order to complete this configuration you will require information from AutoRFP to enter into Okta as well as information provided by Okta to enter into AutoRFP.
Before continuing please:
Keep AutoRFP open in a browser window
Log in to Okta and keep it open in a separate window/tab
Create Application in Okta
This is the first step in the configuration process. All the information necessary to create the Okta application will be available for you to copy and paste into Okta from the AutoRFP app.
The first step contains all the information you need to create your Okta app.
Enter Okta Details Into AutoRFP
Once you have created the application you will be able to use the information generated by Okta to complete the second step in AutoRFP.
Details we need from Okta
Paste them back into AutoRFP
Enforce SSO
Now it's time to enforce SSO for your organisation. You will notice that you will be presented with a table of your users in AutoRFP. If required, please ensure all these accounts are assigned to the newly created Okta app.
Once you're satisfied, click "Enforce SSO".
You're Done
Your organisation is now set up to sign in with Okta. You will be now be required to re-log in to your account with Okta.
Managing SSO
Administrators can disable SSO by clicking the "Disable SSO" button. This will restore password-based authentication. Users who logged in since SSO was enabled will need to reset their password to regain access.
Need Help?
If you encounter issues:
Verify you're using your work email account (matching the one in AutoRFP)
Contact AutoRFP.ai support team for assistance