This guide explains how to configure Okta as a SAML Identity Provider (IdP) for SnackBase.
Prerequisites
- Administrator access to your Okta organization
- SnackBase installed and running
Step 1: Create an App Integration in Okta
- Log in to your Okta Admin Console
- Go to Applications > Applications
- Click Create App Integration
- Select SAML 2.0 and click Next
Step 2: General Settings
- App name: Enter “SnackBase” (or your preferred name)
- App logo: (Optional) Upload a logo
- Click Next
- Single Sign On URL (ACS URL): Enter your SnackBase ACS URL
- Format:
https://<your-domain>/api/v1/auth/saml/acs
- Audience URI (SP Entity ID): Enter a unique identifier for SnackBase
- Format:
https://<your-domain> (or snackbase-app)
- Note: This value must match the
sp_entity_id in your SnackBase configuration
- Name ID format: Select
EmailAddress
- Application username: Select
Email
- Update application username on: Create and update
Step 4: Attribute Statements (Optional but Recommended)
Add the following attribute statements to map user details:
| Name | Name format | Value |
|---|
| email | Unspecified | user.email |
| firstName | Unspecified | user.firstName |
| lastName | Unspecified | user.lastName |
Click Next and then Finish.
- In Okta, go to the Sign On tab of your new application
- Scroll down to SAML Signing Certificates
- Locate the active certificate and click View SAML setup instructions
- In SnackBase, create a new SAML provider configuration with the following values:
| SnackBase Field | Okta Value |
|---|
idp_entity_id | Identity Provider Issuer |
idp_sso_url | Identity Provider Single Sign-On URL |
idp_x509_cert | X.509 Certificate (Paste the full certificate content) |
sp_entity_id | The Audience URI you set in Step 3 |
assertion_consumer_url | The Single Sign On URL you set in Step 3 |
Testing
- Save your configuration in SnackBase
- Attempt to sign in via the SAML SSO button
Troubleshooting
Okta certificates rotate periodically. Make sure to update the certificate in SnackBase after rotation.
Common Issues:
- SAML response validation failed: Verify the
sp_entity_id matches exactly between Okta and SnackBase
- User not found: Check that the application username format matches the user email in Okta
- Certificate expired: Okta certificates expire - update to the new certificate in SnackBase