Skip to main content

How to Configure SAML SSO with Okta

Authenticate and log in to AutoRFP.ai using Okta and SAML

Saul Bard avatar
Written by Saul Bard
Updated today

Article Summary

Configure SAML-based Single Sign-On with Okta to enable secure authentication for your organization. Exchange configuration details between AutoRFP and Okta to establish the connection, then enforce SSO organization-wide.


Estimated Time

5-7 minutes


Prerequisites

  • Administrator permissions in AutoRFP

  • Administrator permissions in Okta

  • All users must have Okta email addresses matching their AutoRFP accounts

  • Access to both AutoRFP and Okta in separate browser windows/tabs

  • Coordination with team about upcoming login method change

‼️ CRITICAL: SSO is an organization-wide change that affects how all users sign in. All users will need to sign in using Okta, and password-based login will be disabled after SSO is enforced.


Step-by-Step Instructions

Step 1: Access SSO Configuration

  1. Navigate to Organizational Settings > Integrations in AutoRFP.

  2. Locate the SSO section.

  3. Select Okta as your provider.

  4. Click Setup to begin.


Step 2: Prepare Your Workspace

  1. Keep AutoRFP open in one browser window/tab.

  2. Log in to Okta in a separate browser window/tab.

  3. Ensure you have admin access in both systems.

πŸ“ Note: You'll need to exchange information between AutoRFP and Okta, so keeping both windows open simplifies the process.


Step 3: Create Application in Okta

  1. In AutoRFP, review the configuration details provided in Step 1 of the setup wizard.

  2. Copy the required information (SSO URL, Audience URI, etc.) from AutoRFP.

  3. Switch to your Okta admin console.

  4. Create a new SAML 2.0 application.

  5. Paste the copied AutoRFP configuration details into the appropriate Okta fields.

  6. Complete the Okta application setup.

Tip: All information necessary to create the Okta application is available in AutoRFP setup wizard for easy copy/paste.


Step 4: Enter Okta Details Into AutoRFP

  1. After creating the Okta application, locate the SAML configuration details in Okta:

    • Identity Provider Single Sign-On URL

    • Identity Provider Issuer

    • X.509 Certificate

  2. Copy these details from Okta.

  3. Return to AutoRFP's setup wizard Step 2.

  4. Paste the Okta details into the corresponding fields in AutoRFP.

  5. Click Save or Continue.

Details we need from Okta:

Paste the information back into AutoRFP


Step 5: Verify User Assignments

  1. Review the table of AutoRFP users displayed in the setup wizard.

  2. Ensure all listed users are assigned to the newly created Okta application.

  3. Switch to Okta and assign users to the AutoRFP application if needed.

  4. Return to AutoRFP once all users are assigned.


Step 6: Enforce SSO

  1. Review the confirmation message.

  2. Click Enforce SSO.

  3. Confirm the action.

  4. You'll be logged out and prompted to re-authenticate using Okta.

πŸ“ Note: Administrators can disable SSO by clicking Disable SSO. This will restore password-based authentication. Users who logged in since SSO was enabled will need to reset their password to regain access.


πŸ’‘ Tips & Best Practices

  • Verify user assignments in Okta match AutoRFP.ai user list

  • Add new users to both AutoRFP.ai and the Okta application simultaneously

  • Monitor Okta logs for authentication issues


βœ‹πŸΌ Common Mistakes to Avoid

  • Not keeping both windows open - slows down configuration process

  • Copying configuration details incorrectly - causes authentication failures

  • Forgetting to assign users to Okta application - users cannot log in

  • Enforcing SSO without verifying email addresses match - authentication fails


Need Help?

πŸ’¬ Live Chat: Available in-app

πŸ“§ Email: [email protected] or contact your Success Manager directly for urgent support.

πŸ“š Learning Centre: learn.autorfp.ai/en

Did this answer your question?