Configuring SSO for Okta

This article explains how to setup SSO with as the Service Provider, and Okta as the Identity Provider. Users can utilize an organization’s Okta Sign-In Page or the WAYFless URL provided by to authenticate with for all account privileges. 

SSO eliminates or dramatically reduces the need for multiple logins, as individuals maintain a single sign-on.  

Okta and have the following requirements before you can complete setup:

  • On the Okta Side: Administrator access to the Okta account to manage applications and permissions.
  • On the Side: An Uptime account with administrator access to configure SAML SSO, which is plan dependent

These instructions assume you are an administrator logged into both and Okta. 

Table of Contents

Step One: Create New App in Okta


Login to your organization’s Okta account admin panel, then click Applications. Click Add Application, and then Create New App. Select Web as the Platform, and SAML 2.0 as the Sign On Method. Okta will ask you to name this integration, and you can also upload a graphic to represent the logo or icon.

After you have named your integration, click Next

Copy the Single Sign On URL (ACS URL) from and paste it into the Single Sign On URL field. 

Step Two: Fill SSO Details into Okta


This step will require you to have and Okta open simultaneously. 

Paste the Requisite URLs into Okta


SSO implementation with Okta will require users to copy and paste the following from to Okta:

  • EntityID/Audience URI

Lastly, download the Okta Certificate to paste the values into 

Changing Attributes and Values requires the following attributes to be set to successfully authenticate the user:

  • A unique user identifier or email address: Name ID  /  Subject NameID
  • The user's email, one of: Email  /  User.Email  /  E-Mail Address  /  eduPersonPrincipalName
  • The user's first name, one of: FirstName  /  User.FirstName  /  Given Name  /  givenName
  • The user's last name, one of: LastName  /  User.LastName  /  Surname  /  sn

Scroll to the Attribute Statements and input the values as seen below:



When this is complete, you are ready to move onto ​

Step Three: Paste in the SSO Login Details and Certificate of Your IdP



Return to to complete Okta SSO setup., requires the EntityID you received fromOkta. Additionally, you must supply the URL that triggers the SSO login with your IdP.

The final steps in your SSO configuration are to paste the contents of the X509 certificate downloaded in step 2 into

Please ensure this certificate is in PEM format.

Testing SSO Implementation


It’s important to confirm SSO implementation is working through Okta, or to receive feedback on the specific error that is causing an issue for your SSO implementation. The fastest way to test this method is with the WAYFless URL provided by

You can also test from your Okta domain. Simply click on the application you created, which should successfully log your user account into the dashboard. 

When using Okta as an SSO provider, users are automatically created on login with "View Only" permissions. An account administrator can adjust permissions in the Uptime account after the use has been created.

Note any error messages you receive and use the corresponding support articles to troubleshoot the issue:

Was this article helpful?
0 out of 1 found this helpful



Article is closed for comments.

Have more questions?
Submit a request
Share it, if you like it.