Add Okta Workforce as a SAML connection
Enabling SAML with Okta Workforce allows your users to sign up and sign in to your Clerk application with their Okta account. It requires that a SAML connection is configured in both the Clerk Dashboard and Okta. This guide assumes that you have access to the Clerk app's settings in the Clerk Dashboard. The "customer" in this case is whoever has access to the Okta Workforce's app settings.
Create an Okta SAML connection in Clerk
- In the Clerk Dashboard, navigate to the SSO connections page.
- Select Add connection and select For specific domains or organizations.
- Under SAML, select Okta Workforce.
- Enter the Domain. This is the email domain of the users you want to allow to sign in to your app. Optionally, select an Organization.
- Enter the Name. This will be displayed on the sign-in form.
- Select Add connection. You'll be redirected to the connection's configuration page. Note that the connection is disabled by default.
- In the Service Provider Configuration section, save the Single sign-on URL and Audience URI (SP Entity ID) values somewhere secure. You'll need to give these to the customer so they can configure their Okta app.
Configure SAML app
Now that the enterprise connection is configured in Clerk and the Single sign-on URL and Audience URI (SP Entity ID) are known, the customer's Okta app needs to be configured. At a high level, the process is:
- Create a new enterprise app in Okta.
- Add the Single sign-on URL and Audience URI (SP Entity ID) from Clerk to the Okta app's SAML configuration.
- Verify that the attribute mappings are correct.
- Assign selected users or groups to the app.
- Obtain and share the app's Metadata URL.
To get you started, you can use the following email template with detailed instructions:
Add the Metadata URL in the Clerk Dashboard
After following the instructions in the email, your customer should have sent you the Okta app's Metadata URL. Now, you're going to add it to the Clerk connection, completing the SAML connection configuration.
- Navigate to the SSO connections page in the Clerk Dashboard.
- Select the SAML connection.
- In the Identity Provider Configuration section, under Metadata configuration, paste the Metadata URL that you received from the customer.
- Select Fetch & save. Keep the page open for the next step.
Enable the connection in Clerk
The SAML connection is ready to enable! Once enabled, all users with email addresses ending in the domain will be redirected to Okta at sign-up and sign-in.
- Navigate back to the Clerk Dashboard where you should still have the connection's configuration page open. If not, navigate to the SSO connections page and select the connection.
- At the top of the page, toggle on Enable connection and select Save.
Feedback
Last updated on