This page details the steps required to configure a single-sign-on (SSO) application on an Okta user directory using SAML. The application will allow users to authenticate with their existing Okta user accounts when logging in to EdgeTier, and when users are disabled on Okta, they will lose access to EdgeTier automatically.
Note that full user provisioning is not supported, users will need to be assigned the application in Okta, AND created separately in EdgeTier for successful authentication.
In the steps below, you will be creating an internal application on your Okta instance and passing the configuration details to EdgeTier for integration.
On the Create SAML Integration page, under General Settings, enter a name for your app - “EdgeTier” will work.
(Optional) Upload a logo and choose the visibility settings for your app. If you’d like to use the EdgeTier Logo, it is available here: https://cdn.edgetier.com/edgetier-logo/edgtier-icon.png
Choose Next.
Under GENERAL, for Single sign on URL, enter "**https://watchtower.auth.eu-west-1.amazoncognito.com/saml2/idpresponse**”
For Audience URI (SP Entity ID), enter ”urn:amazon:cognito:sp:eu-west-1_uYWAoliDm”
Under ATTRIBUTE STATEMENTS (OPTIONAL), add a statement with the following information:

For all other settings on the page, leave them as their default values or set them according to your preferences.
Choose Next.
Choose a feedback response for Okta Support: typically, use “I’m an Okta customer adding an internal app”.