Okta SSO for Apono logins

Enable your organization to use single sign-on to log in to Apono

Implementing Okta Single Sign-On provides seamless and secure authentication across various applications. Centralized identity management reduces password fatigue and increases overall security for your organization.

This guide shows you how to enable SSO for logging in to Apono.


Prerequisites


Enable Okta SSO

Use the following resources as needed:

Follow these steps to create a SAML integration and enable Okta SSO:

  1. From the side navigation in the Okta Admin Console, click Applications > Applications. The Applications page opens.

  2. Click Create App Integration. The Create a new app integration popup window appears.

  3. Select SAML 2.0.

  4. Click Next. The General Settings tab appears.

  5. Enter an App name for the integration.

  6. Click Next. The Configure SAML tab appears.

  7. In the Single sign-on URL field, enter https://login.apono.io/auth/saml/callback.

  8. In the Audience URI (SP Entity ID) field, enter Apono.

  9. From the Name ID format dropdown menu, select EmailAddress.

  10. From the Application username dropdown menu, select Okta username.

  11. Under Group Attribute Statements (optional), map your Okta groups to Apono roles by defining a group attribute statement.

  12. Click Next. The Feedback tab appears.

  13. Click Finish. The new application appears.

  14. On the Sign On tab, under SAML Signing Certificates, click Actions > View IdP metadata for the active certificate. The XML file appears in a new tab.

  15. Save the .xml file to your device.

  16. Send the following information to Apono support:

    • The downloaded .xml file

    • Domains that your organization allows to log in to Apono

When your Okta SSO integration is available, you will be able to use SSO to log into Apono with your company domain.

Last updated