Skip to main content
Okta single sign-on (SSO) integration

In this tutorial, you'll learn how to integrate GetAccept with Okta.

Updated over a week ago


When you integrate GetAccept with Okta, you can:

  • Control in Okta who has access to GetAccept.

  • Enable your users to be automatically signed in to GetAccept with their Okta user accounts.

  • Manage your accounts in one central location - the Okta portal.

Before setting up the integration it is good to understand:

  • Each entity in GetAccept requires a separate Application in Okta.

  • The normal login page to GetAccept will not be supported for SSO. To short-link directly to SSO login, please refer to the Login URL in the GetAccept SAML settings.

How To Setup SAML

Step 1: Create GetAccept user groups in Okta

  1. From the Developer Console, hover over the Directory and then select Groups from the menu that appears.

  2. Click Add Group and fill out a name for the GetAccept Administrator group, example GetAccept Administrators

  3. Click Add Group again and now fill out a name for the GetAccept User group, for example, GetAccept Users.

Step 2: Add GetAccept to Okta Applications

  1. From the Developer Console, switch to Classic UI, go to the Applications page, and click Add Application.

  2. Click Create New App, select Web and SAML 2.0, and click Create.

  3. Enter GetAccept as App name and you can optionally add the logo from below. Right-click the logo, save it to your desktop then select and upload it to the new application. Click Next when done.

Step 3: ​Setting up SAML settings in Okta

  1. Login to GetAccept.

  2. Go to Settings.

  3. Select Integrations.

  4. Look for Provisioning and SSO.

  5. ​Click the Settings button on the SAML Authentication connector.

  6. Copy the ACS URL from GetAccept,
    and paste this URL into Okta Single sign-on URL and Default RelayState.

  7. Copy the Entity ID from GetAccept,
    and paste this URL into Okta Audience URI (SP Entity ID).

  8. Change the setting Name ID format in Okta to EmailAddress. Click Next at the bottom of the form.

  9. On the final screen, select I'm an Okta customer adding an internal app, and click the Finish button.

Step 4: Configure GetAccept SSO

Before you proceed with connecting SAML in GetAccept, we recommend opening a new session in incognito mode. You can use that tab to test the connection at the end of this guide, that way you can easily disconnect the SAML connector if you run into any error codes when testing.

Choose where to apply your SAML copnnection

GetAccept platfrom

This will apply the SAML connection to our Core App only.

API or integration

This will apply the SAML connection both on our external API, integrations and our Core App.

Enable SAML for all entities

If you have an organisation, meaning you have sub entities to this master entity and you choose to check this box. Then the connection will apply to the whole organisation.

  1. After finishing creating the application in Okta, click the button View Setup Instructions in the yellow section.

  2. Then copy and paste the information from the setup instructions page to the fields in the GetAccept SAML connector.

  3. Insert the value of Identity Provider Issuer in the first field called Identity Provider Issuer URL / Entity ID.

  4. Insert the value of ​Identity Provider Single Sign-On URL in the field called SSO Login Redirect URL / SAML 2.0 Endpoint.

  5. Insert the full Base64 content of the X.509 Certificate including the begin/end tags and dashes.

  6. Click Save in GetAccept to save the SAML integration settings.

Step 5: Assign Okta user groups to the GetAccept application

  1. Go back to the Okta application GetAccept and select the Assignments tab.

  2. Hover Assign and click Assign to Groups from the list.

  3. Click the Assign button next to the GetAccept Administrators and GetAccept Users group.

  4. Click Done to close the Assign window.

  5. Add the users who should have access to the SSO application and GetAccept using the Directory in Okta.

Step 6: ​Test the GetAccept application

  1. Make sure the users are added to GetAccept manually or configure SCIM to automatically sync users, roles, and teams from Okta to GetAccept.

  2. Try out the SSO integration by going to My Apps in the top-right corner of Okta.

  3. Click the GetAccept box to SSO login directly to GetAccept with the current authenticated user in Okta.

Need help?

We are here to help you if you get stuck at any step in setting up the integration.
Use the chat icon to the right to start a conversation with our support team or send an email to 🧡​

Did this answer your question?