Configure an Okta enterprise application

You can integrate Okta with Vantage. To do this you must create an enterprise application in Okta and assign users to it.

Okta groups are mapped to groups in Vantage using the group identifier. The group must exist in both Vantage and Okta and its Group ID in Okta must match its SAML Name or ID in Vantage. During authentication, Okta passes the Okta attribute statements defined for the authenticating user. Vantage ignores those for groups that don't match any of its own. For more details, see Group creation.

  1. In the Okta Admin console, select Applications > > Create App Integration.
  2. Select SAML 2.0.
  3. Enter a name such as Vantage.
  4. Select Next.
  5. Enter the Single sign on URL that corresponds to the assertion consumer service (ACS) uniform resource locator (URL) for Vantage. For example: https://YOUR_VANTAGE_URL/api/v1/saml/auth
  6. Enter the Audience URI. For example: https://YOUR_VANTAGE_URL/api/v1/saml/metadata
    The Audience URI is also known as Audience Restriction or SP Entity ID.
  7. Define Group Attributes Statements.
    Note: Vantage authentication relies on group attribute statements. You must create such statements for all group that are used for authentication. Users that belong to the group pass the statement you define. XREF
  8. After you have entered these values, confirm your choices and select Save.
  9. Assign users to the enterprise application to grant them access. For more details, see the Okta documentation.
  10. Download the Okta identity provider (IdP) metadata file.
    1. In Okta, select the Vantage enterprise application's Sign On tab.
    2. Select the Identity Provider Metadata link.


  11. Save this file to a location that the browser that you use for Vantage can access.
  12. Configure Vantage for SSO.