Skip to main content
All CollectionsGetting Started with Docket
Setting up SAML SSO with Okta for Docket
Setting up SAML SSO with Okta for Docket
A
Written by Athul Rajeev
Updated over 3 months ago

This document serves as a comprehensive guide for configuring SAML Single Sign-On (SSO) with Okta for your Docket application. The guide will also cover the steps to set up a user deactivation hook to automate account deactivation within Docket.


Prerequisites:

Before you begin, ensure the following:

  • You have admin-level access to both Okta and Docket.

  • Access to the Okta admin console.


1. Setting up SAML SSO with Okta:

To implement SAML-based SSO between Okta and the Docket app, follow these steps to establish the authentication handshake.

Step 1: Create a SAML App Integration on Okta

  1. Log into your Okta admin console.

  2. Navigate to Applications > Applications.

  3. Click on Create App Integration.

  4. Select SAML 2.0 as the sign-in method, then click Next.

Step 2: Configure App Name and Logo

  1. Name your application, e.g., Docket.

  2. Optionally, upload the Docket logo for easy identification.

  3. Click Next to continue.

Step 3: Enter SAML Settings

In this step, you need to input the URLs and identifiers to ensure proper communication between Okta and Docket.

  • Single Sign-On URL:

Copy the following URL and paste it into the Single Sign-On URL field in Okta:

  • Audience URI (SP Entity ID):

Copy and paste the following URI as the Audience URI (SP Entity ID):

  • If NameID format is different than Email than select email or else keep it unspecified

You can find the urls ready to copy from Single Sign-On Tab from Docket settings

Step 4: Add User Attributes

  1. Add user attributes to map user profiles from Okta to Docket.

  2. Common attributes include:

    • First Name

    • Last Name

  3. Make sure these are correctly mapped to ensure smooth user provisioning.

Step 5: Save SAML Configuration

  1. Review the settings and click Finish.

  2. Copy the Sign-On URL, Issuer URL, and Certificate from Okta’s Sign-On tab. You will need these in the next step.


2. Configuring SAML Settings in Docket

Now that you've set up SAML in Okta, configure it in Docket.

  1. Log in to your Docket admin panel.

  2. Navigate to Settings > SSO Configuration.

  3. Enter the following details copied from Okta:

    • Sign-On URL

    • Issuer

    • Certificate

  1. Click Save to finalize the SSO setup.


3. User Deactivation Hook Setup

To automate user deactivation in Docket when users are deactivated in Okta, configure a deactivation event hook.

Step 1: Access Event Hooks in Okta

  1. Log in to your Okta admin console.

  2. Navigate to Workflow > Event Hooks.

  3. Click Create Event Hook.

Step 2: Configure Event Hook

  1. In the Event Hook form, provide the following details:

    • Name: e.g., Docket User Deactivation Hook

    • URL: Provide the URL from the Docket platform for user deactivation events.

    • Authentication: Configure the necessary authentication (such as headers) to allow Okta to communicate with Docket.

  2. Select the User Deactivation event as the trigger.

Step 3: Save and Activate Hook

  1. After completing the form, click Save.

  2. Activate the hook, and Okta will now automatically trigger deactivations within Docket based on user status changes in Okta.


Conclusion:

By following the steps above, you can successfully configure SAML-based SSO with Okta and Docket, enabling secure and seamless authentication for your users. Additionally, the automated user deactivation hook ensures that user account management remains efficient.

For further assistance or troubleshooting, please contact our support team at [email protected].

Did this answer your question?