Add Okta Workforce as a SAML connection
You will learn the following:
- Use Okta Workforce to enable single sign-on (SSO) via SAML for your Clerk application.
Set up an enterprise connection in Clerk
To create a SAML connection in Clerk:
- In the Clerk Dashboard, navigate to the SSO Connections page.
- Select Add connection and select For specific domains.
- Under SAML, select Okta Workforce as the identity provider.
- Add the Name of the connection. This is the name that will be displayed in the sign-in form.
- Add the Specific Domain that you want to allow this connection for. This is the domain of the users you want to allow to sign in to your application.
- Select Add connection. You will be redirected to the connection's configuration page.
- Find the Service Provider Configuration section.
- Save the Single sign-on URL and the Audience URI (SP Entity ID) values somewhere secure. You'll need these in the Configure your service provider step.
- Leave this page open.
Create a new enterprise application in Okta
To create a new enterprise application in Okta:
- Navigate to Okta and sign in.
- In the Okta dashboard, select Admin in the top right corner.
- In the navigation sidebar, select the Applications dropdown and select Applications.
- Select the Create App Integration button.
- In the Create a new app integration modal, select the SAML 2.0 option and select the Next button.
- Once redirected to the Create SAML Integration page, fill in the General Settings fields. An App name is required.
- Select the Next button to continue.
Configure your service provider
Once you have moved forward from the General Settings instructions, you will be presented with the Configure SAML page.
To configure your service provider (Clerk), you must add these two fields to your IdP's application:
- Single sign-on URL - This is your application's URL that your IdP will redirect your users back to after they have authenticated in your IdP.
- Audience URI (SP Entity ID) - This is a unique identifier for your SAML connection that your IdP application needs.
To fill out the appropriate values for these fields:
- Paste the Single sign-on URL and the Audience URI (SP Entity ID) values that you saved earlier into their respective fields.
Map Okta claims to Clerk attributes
Mapping the claims in your IdP to the attributes in Clerk ensures that the data from your IdP is correctly mapped to the data in Clerk.
Clerk attribute | Okta claim |
---|---|
mail | user.email |
firstName | user.firstName |
lastName | user.lastName |
- In the Okta dashboard, find the Attribute Statements (optional) section.
- For the Name field, enter
mail
. - For the Value field, choose
user.email
from the dropdown. - Select the Add Another button to add another attribute.
- For the Name field, enter
firstName
. - For the Value field, choose
user.firstName
from the dropdown. - Select the Add Another button to add another attribute.
- For the Name field, enter
lastName
. - For the Value field, choose
user.lastName
from the dropdown. - Scroll to the bottom of the page and select the Next button to continue.
- You will be redirected to the Feedback page. Fill out the feedback however you would like and select the Finish button to complete the setup.
Assign selected user or group in Okta
You need to assign your users/user groups to your enterprise application. For example, if you were part of the Clerk organization, you would have access to users and groups in the Clerk organization. In this case, you could assign one or more users or entire groups to the enterprise application you just created.
- In the Okta dashboard, select the Assignments tab.
- Select the Assign dropdown. You can either select Assign to people or Assign to groups.
- In the search field, enter the user or group of users that you want to assign to the enterprise application.
- Select the Assign button next to the user or group that you want to assign.
- Select the Done button to complete the assignment.
Configure your identity provider
Once you have completed the setup in Okta, you will be redirected to the application instances page with the Sign On tab selected.
- Under Sign on methods, copy the Metadata URL.
- Navigate back to the Clerk Dashboard and find the Identity Provider configuration section.
- Under the Metadata configuration option, paste the Metadata URL.
- Select the Fetch & save button to complete the setup.
Enable the connection for Clerk
To make the connection available for your users to authenticate with:
- In the Clerk Dashboard, you should still have the connection's configuration page open. If not, navigate to the SSO Connections page and select the connection.
- Toggle on Enable connection and select Save.
Feedback
Last updated on