We recommend using two different browser sessions (or two separate browsers) while configuring Okta and Plerion. This prevents conflicts caused by sharing the same login session.
Steps to configure Okta SSO
1
Log in to Okta
Sign in to your Okta account with the required roles and permissions.
2
Create a new Okta application
- Go to
Applications
and clickCreate App Integration
. - Select
SAML 2.0
and clickNext
. - Enter an app name and click
Next
.

3
Configure SAML settings
- In Plerion, go to
Admin
>Security
>Single sign-on
and copy the SSO URL. - In Okta, paste this URL into the Single sign-on URL and Audience URI (SP Entity ID) fields.
- Set
Name ID format
toEmailAddress
. - For
Attribute statements
, provide the required values and continue.

4
Finish Okta application setup
Review your settings, select your preferences, and click
Finish
.5
Add users to the Okta application
- In Okta, go to
Directory
>People
and clickAdd person
. - Enter the user details and click
Save
. - Open your application, go to the
Assignments
tab, clickAssign
>Assign to people
, and assign the new user. - Click
Done
to confirm.

6
Copy identity provider details
- In your application, go to the
Sign-on
tab and clickView SAML setup instructions
. - Copy the Single sign-on URL, Identity provider issuer, and X.509 certificate.

7
Configure trust in Plerion
- In Plerion, go to
Admin
>Security
>Single sign-on
. - Paste the following values into the matching fields:
- Single sign-on URL
- Identity provider issuer
- X.509 certificate
- Save the configuration.

8
Test your Okta SSO connection
- Click
Test
in Plerion. A new window will open where you can sign in with the user you added in Okta. - Verify that you can log in to Plerion using Okta SSO.

Attribute mapping and roles
1
Create and assign Okta groups
- In Okta, go to
Directory
>Groups
and clickAdd group
. - Enter a name (for example, testOrgAdmin) and click
Save
. - Open your application, go to the
Assignments
tab, clickAssign
>Assign to groups
, and assign your new group. - Add the previously created user to this group.

2
Configure group attribute statements in Okta
- In your application, go to the
General
tab. - Under
SAML settings
, clickEdit
and go toConfigure SAML
. - Add a Group attribute statement.
Example: Set the attribute name to group and use your group name (testOrgAdmin) as the filter.

3
Map attributes in Plerion
- In Plerion, go to
Admin
>Security
>Single sign-on
>Attribute mapping
.- For Email, select Use SAML Name ID.
- For Display name, leave unchecked to let users choose their own, or map the Okta user’s first and last name.
- For Roles, add a mapping with the SAML attribute name group.
- Map testOrgAdmin to the Organization Admin role.
- Save the configuration.

4
Test the attribute mapping
- Click
Test
in Plerion. - Verify that the attribute mapping works as expected.

Accessing Plerion through Okta
You can access Plerion using the App Embed link from your Okta application (General
tab > App embed link
).Log in with your Okta user credentials, and you will be signed in with the mapped Plerion role.
