Article Summary
Configure SAML-based Single Sign-On with Okta to enable secure authentication for your organization. Exchange configuration details between AutoRFP and Okta to establish the connection, then enforce SSO organization-wide.
Estimated Time
5-7 minutes
Prerequisites
Administrator permissions in AutoRFP
Administrator permissions in Okta
All users must have Okta email addresses matching their AutoRFP accounts
Access to both AutoRFP and Okta in separate browser windows/tabs
Coordination with team about upcoming login method change
βΌοΈ CRITICAL: SSO is an organization-wide change that affects how all users sign in. All users will need to sign in using Okta, and password-based login will be disabled after SSO is enforced.
Step-by-Step Instructions
Step 1: Access SSO Configuration
Navigate to Organizational Settings > Integrations in AutoRFP.
Locate the SSO section.
Select Okta as your provider.
Click Setup to begin.
Step 2: Prepare Your Workspace
Keep AutoRFP open in one browser window/tab.
Log in to Okta in a separate browser window/tab.
Ensure you have admin access in both systems.
π Note: You'll need to exchange information between AutoRFP and Okta, so keeping both windows open simplifies the process.
Step 3: Create Application in Okta
In AutoRFP, review the configuration details provided in Step 1 of the setup wizard.
Copy the required information (SSO URL, Audience URI, etc.) from AutoRFP.
Switch to your Okta admin console.
Create a new SAML 2.0 application.
Paste the copied AutoRFP configuration details into the appropriate Okta fields.
Complete the Okta application setup.
Tip: All information necessary to create the Okta application is available in AutoRFP setup wizard for easy copy/paste.
Step 4: Enter Okta Details Into AutoRFP
After creating the Okta application, locate the SAML configuration details in Okta:
Identity Provider Single Sign-On URL
Identity Provider Issuer
X.509 Certificate
Copy these details from Okta.
Return to AutoRFP's setup wizard Step 2.
Paste the Okta details into the corresponding fields in AutoRFP.
Click Save or Continue.
Details we need from Okta:
Paste the information back into AutoRFP
Step 5: Verify User Assignments
Review the table of AutoRFP users displayed in the setup wizard.
Ensure all listed users are assigned to the newly created Okta application.
Switch to Okta and assign users to the AutoRFP application if needed.
Return to AutoRFP once all users are assigned.
Step 6: Enforce SSO
Review the confirmation message.
Click Enforce SSO.
Confirm the action.
You'll be logged out and prompted to re-authenticate using Okta.
π Note: Administrators can disable SSO by clicking Disable SSO. This will restore password-based authentication. Users who logged in since SSO was enabled will need to reset their password to regain access.
π‘ Tips & Best Practices
Verify user assignments in Okta match AutoRFP.ai user list
Add new users to both AutoRFP.ai and the Okta application simultaneously
Monitor Okta logs for authentication issues
βπΌ Common Mistakes to Avoid
Not keeping both windows open - slows down configuration process
Copying configuration details incorrectly - causes authentication failures
Forgetting to assign users to Okta application - users cannot log in
Enforcing SSO without verifying email addresses match - authentication fails
Need Help?
π¬ Live Chat: Available in-app
π§ Email: [email protected] or contact your Success Manager directly for urgent support.
π Learning Centre: learn.autorfp.ai/en





