Okta SSO
This guide walks you through connecting Okta to Peerdom for single sign-on and automatic user sync. The setup has two parts: a SAML application for login and an API Services application for sync. You need admin access to the Okta Admin Console to complete these steps.
Part 1: SAML application (login)
Step 1: Create a Peerdom user group
Create a new group in Okta and assign all users who should have access to Peerdom. Note the Group ID for later.
Step 2: Create the SAML application
Navigate to Applications > Applications and create a new application. Select SAML 2.0 as the type. Name the application Peerdom Login (or a name of your choice).
Step 3: Configure SAML settings
Enter the following values:
- Single Sign On URL:
https://backend.peerdom.org/auth/saml/return - Audience URI: provided by Peerdom support
- Name ID format: EmailAddress
- Application username: Okta Username
Step 4: Download the certificate
After creating the application, go to the Sign On tab. Download the SHA-2 certificate from the Certificates section.
Part 2: API Services application (sync)
Step 5: Create the API Services application
Navigate to Applications > Applications and create a new application of type API Services. Name it Peerdom Sync. Note the Application (Client) ID.
Step 6: Disable Proof of Possession
On the application’s General tab, verify that Proof of Possession is turned off.
Step 7: Set up credentials
Under Client Credentials, click Edit and change the key type to Public key / Private key. Click Add Key, then Generate New Key. Copy and save the JSON certificate displayed at the bottom of the dialog. You cannot retrieve this certificate later.
Step 8: Grant API scopes
Navigate to the Okta API Scopes tab. Search for and grant the following scopes:
okta.users.readokta.groups.read
Step 9: Assign the admin role
Navigate to the Admin Roles tab. Click Edit Assignments and select Read-only Administrator. Save the changes.
Send credentials to Peerdom
Contact Peerdom support with the following information:
- Okta domain (for example,
yourcompany.okta.com) - Group ID for Peerdom users
- SAML Sign On URL from the Peerdom Login application
- SHA-2 certificate file
- Application (Client) ID from the Peerdom Sync application
- JSON certificate from the key generation step
Peerdom support will complete the connection and confirm that both login and sync are working.
Related
- Single Sign-On (SSO), overview of SSO features and sync behavior
- Microsoft Entra ID SSO, alternative provider setup
- Google Workspace SSO, alternative provider setup
- Directory, manage your synced user list