Configuring Okta as the Identity Provider  

    1. Log in to your Okta domain.

    2. Go to the Applications >> Add Application.

      Okta_4

    3. Click Create New App.

      Okta_2

    4. From the displayed dialog box, choose SAML 2.0 as the sign-on method.

    5. Click Create.

      Okta_3

    6. In the next window, provide a Name for your application.
    7. Upload the Logo of the application and click Next.

      Okta_4
    8. In the displayed page, enter the Assertion Consumer URL of ServiceDesk Plus MSP under Single Sign-On URL.
    9. Enter the Entity ID in the Audience URI field and choose transient as the Name ID format. Currently, ServiceDesk Plus MSP supports Transient, Persistent, and Email Address as Name ID formats.
      1. To login using your username and domain, select Transient or Persistent.
      2. To login using your email address, select Email Address.
    10. Choose the Application user name from the drop-down menu. The login name for a new user added into the application will be generated based on the format configured here.

      Note:

      Ensure that the attribute chosen here matches the login name generated for a new user in ServiceDesk Plus MSP.
      In addition, if the user is under a domain, Okta must return the user name with the domain name in the  <domain name\user name> format.
      If these conditions are not satisfied, it can lead to redundant user addition.

    11. Click Advanced Settings.

      Okta_5
    12. To enable the SAML logout service, select Allow the application to initiate Single Logout.
    13. Provide the Single Logout URL and add the entity ID in SP Issuer.
    14. In Signature Certificate field, click Browse and upload the SP Certificate of ServiceDesk Plus MSP.
    15. Click Next.

      Okta_6
    16. Choose the option, I'm a Software Vendor. I'd Like to integrate my app with Okta.
    17. Click Finish

    Now you have configured ServiceDesk Plus MSP as an application.

               Okta_7

    1. Go to the Sign On tab and click View Setup Instructions.

      Okta_8

    2. Another tab with the IdP configurations such as Login URL (Single Sign-On URL), Logout URL (Single Logout URL), and the certificate file will be displayed. Use these to integrate with the IdP.

      Okta_9
    3. Assign the application to people/groups from the Assignments tab, as shown below.
    Okta_10


    You have now configured ServiceDesk Plus MSP as a service provider in Okta. 

    Go to the SAML configuration page in ServiceDesk Plus MSP and provide the IdP details to complete the integration.

    Zoho Corp. All rights reserved.