Setting up SAML SSO using Okta

Last updated November 5, 2024

Introduction

This section provides guidance for how to set up an Okta SAML SSO Integration with Pulse and links to resources provided by Okta that are relevant to creating and configuring a new SAML SSO integration. 

Note: this feature is only available to customers on a paid Pulse plan. See here for general information about how to configure your SAML integration. 

Setup guide

See here for a description of SAML app integrations in Okta. The relevant section for integrating with pulse is Okta as an Identity Provider.

  1. Create a new SAML app integration.
    • See here for a guide showing how to create a SAML app integration in Okta.
  1. Assign the application to the appropriate users.
    • See here for a guide showing how to assign applications to users in Okta.
  1. Ensure that those users have relevant attribute statements in their SAML assertion
    • See the section User Attribute Statements section above for the details that Pulse requires for each user.
    • See here for documentation about user attribute statements
    • It is advisable to set up Okta groups for each role and each region in Neat Pulse, and to map group membership of those to provide these attribute statements. 
    • See here for guides about managing groups in Okta
    • See here for guides about group attribute statements

Example of user and group attribute statements in an Okta SAML app integration. Please note that this is provided as a reference solution to mapping groups to attribute statements, and may not be well suited to the needs of your organization. 

The Okta groups used in this example are: PulseRoleOwner, PulseRoleRegionAdmin, PulseRegionNorway.