Okta as IdP for wordpress

WordPress SAML SP Single Sign-On (SSO) plugin gives the ability to enable SAML Single Sign-On (SSO) for your WordPress sites. Our plugin is compatible with all the SAML compliant Identity providers. Here we will go through a step-by-step guide to configure SSO between WordPress site and Okta by considering Okta as IdP.

miniorange img Pre-requisites : Download And Installation

To configure Okta as SAML IdP with WordPress, you will need to install the miniOrange WP SAML SP SSO plugin:


Step-by-step Video to Setup SSO between WordPress and Okta

Step 1: Setup Okta as Identity Provider

Follow the steps below to configure Okta as IdP

miniorange img Configure Okta as IdP

  • In the miniOrange SAML SP SSO plugin, navigate to Service Provider Metadata tab. Here, you can find the SP metadata such as SP Entity ID and ACS (AssertionConsumerService) URL which are required to configure the Identity Provider.
  • WordPress SAML Single Sign-On (SSO) upload metadata
  • Log into Okta Admin Console. Select "Classic UI" and then Application.
  • SAML Single Sign-On (SSO) using Okta as Identity Provider(IdP), Okta SSO Admin_Dashboard
  • Click on Add Applications.
  • SAML Single Sign-On (SSO) using Okta as Identity Provider(IdP), Okta SSO add_application
  • Click on Create New App.
  • Click on the SAML 2.0.
  • SAML Single Sign-On (SSO) using Okta as Identity Provider(IdP), Okta SSO SAML 2.0 Configure
  • In General Settings, enter App Name and click on Next.
  • In SAML Settings, enter the following:
  • SAML Single Sign-On (SSO) using Okta as Identity Provider(IdP), Okta SSO SAML_SETTINGS
    Single Sign On URL Enter ACS (AssertionConsumerService) URL from the Service Provider metadata tab of the module.
    Audience URI (SP Entity ID) Enter SP Entity ID / Issuer from the Service Provider Metadata tab of the module.
    Default Relay State Enter Relay State from the Service Provider Metadata tab of the module.
    Name ID Format Select E-Mail Address as a Name Id from dropdown list.
    Application Username Okta username.
  • Configure Attribute Statements and Group Attribute Statement (Optional).
  • SAML Single Sign-On (SSO) using Okta as Identity Provider(IdP), Okta SSO Add_Attributes
  • If you have integrated your Active Directory in Okta and want to map the AD groups, please make sure that you have added the OUs used to import groups.You will also need to map the memberOf
    attribute under the integrated directory’s configuration.

miniorange im

g Assigning Groups/People

  • After creating and configuring the app go to the Assignment Tab in Okta.
  • Here we select the peoples and groups you want to give access to log in through this app. Assign this to the people/group you would to give access to.
  • SAML Single Sign-On (SSO) using Okta as Identity Provider(IdP), Okta SSO Assign_groups
  • After assigning the people/groups to your app, go to Sign On tab.
  • Click on View Setup Instructions to get the SAML Login URL (Single Sign on URL), Single Logout URL, IDP Entity ID and X.509 Certificate. You will need this to configure the Service Provider.
  • SAML Single Sign-On (SSO) using Okta as Identity Provider(IdP), Okta SSO Configure setup