This article details how to configure Okta as the primary Identity Provider to facilitate SSO with Dots' partner application.
Supported Features
- Identity provider-initiated flow - This authentication flow occurs when the user attempts to log in to the DOTS from the Okta portal.
Requirements
In order to proceed with configuring login with SSO through Okta, you must:
- Have access to an Okta tenant
- Be an Okta administrator to that tenant
- Be an existing DOTS client. If you do not have a client account, you can apply for one here: https://dotstech.com/
Configuration
- Go to Applications -> Applications
- Go to Browse App Catalog
- Search DOTS
- Click on Add Integration
- On the General settings tab enter the name of the Application
- On the Sign-On Options tab select SAML 2.0
- For `Default RelayState, enter
`{"clientOrigin": "https://app.dots.tech", "organizationName": "your-okta-organization-name"}` .
- Change the Application username format to Email
- Click Done.
- Create a group for users who will use the application. Go to Directory -> Groups
- Click Add group
- Enter a Name and Description for the group
- Click Assign people and select those who will have access to the application (who are already DOTS admin).
- Click the Applications tab
- Click on the Assign application button
- Select the created application
- Click Done.
- Go to Applications -> Applications
- Select the created application
- Go to the Sign On tab.
- Copy the SAML metadata URL and send it to DOTS support (support@dotstech.com).