Search Results :
×Meet us at WordCamp Kerala 2024 Conference to explore solutions. Know More
Okta Single Sign On (SSO) login for WordPress [SAML] can be achieved by using our WordPress SAML Single Sign On (SSO) plugin. Our SSO plugin is compatible with all the SAML compliant Identity Providers and enables secure Okta Login into WordPress sites. Here we will go through a guide to configure WordPress Okta SSO / Login into WordPress site by considering Okta As IDP (Identity Provider) and WordPress as SP (Service Provider).
You can visit our WordPress SSO plugin to know more about the other features we provide.
Follow the steps below to configure Okta as IdP
Single Sign On URL |
ACS (AssertionConsumerService) URL from the Service Provider Metadata tab of the Plugin |
Audience URL (SP Entity ID) |
SP Entity ID / Issuer from the Service Provider Metadata tab of the Plugin |
Default Relay State |
Relay State from the Service Provider Metadata tab of the Plugin |
Name ID Format |
Select E-Mail Address as a Name Id from dropdown list |
Application Username |
Okta username |
Assigning Groups/People
Note: If you intend to set up Attribute Mapping, Role Mapping, and other configurations on the Identity Provider's end, you can find detailed instructions in the provided setup guide, which is linked here.
In the WordPress SAML SSO plugin, go to the Service Provider Setup tab of the plugin. There are two ways to configure the WordPress SSO plugin:
A. By uploading IDP metadata:
B.Manual Configuration:
In the WordPress SAML SSO plugin, go to the Service Provider Setup tab of the plugin. There are two ways to configure the WordPress SSO plugin:
A. By uploading IDP metadata:
B.Manual Configuration:
NOTE: If you click on Test Configuration button in Service Provider Setup tab and authenticate with your IDP, you can see a list of attributes sent by the IDP in the Attribute/Role mapping tab. This information can be used to provide the above mapping.
In the standard plugin, you can choose a default role which will be assigned to all the non-admin users when they perform SSO.
In the Standard plugin you can enable SP-initiated SSO using the following options.
NOTE: Please enable the Backdoor login and note down the backdoor URL. This will allow you to access the WordPress login page in case you get locked out of the IDP.
In the WordPress SAML SSO plugin, go to the Service Provider Setup tab of the plugin. There are two ways to configure the WordPress SSO plugin:
A. By uploading IDP metadata:
B.Manual Configuration:
This feature allows you to assign and manage roles of the users when they perform WordPress Okta SSO. Along with the default WordPress roles, this is compatible with any custom roles as well.
In the Premium plugin you can enable SP-initiated SSO using the following options.
NOTE: Please enable the Backdoor login and note down the backdoor URL. This will allow you to access the WordPress login page in case you get locked out of the IDP login.
You have successfully configured WordPress as SAML SP for achieving WordPress Okta SSO into your WordPress Site via Okta.
In this Guide, you have successfully configured Okta SAML Single Sign On (Okta WordPress SSO / Okta WordPress Login), choosing Okta as IdP and WordPress as SP. WordPress SAML Single Sign On – SSO plugin solution ensures that you are ready to roll out secure access / Login into WordPress (WP) site using Okta login credentials.
Allows syncing user's creation, updation and deletion from your IDP to WordPress site
Know more →Restricts WordPress pages and posts based on User Roles and User's Login Status
Know more →Maps SSO users to LearnDash groups as per the group attributes sent by your IDP
Know more →If you are looking for anything which you cannot find, please drop us an email on samlsupport@xecurify.com
Get prompt support from our technical experts, accessible around the clock for direct assistance
Easily set up the plugin with access to our detailed knowledge base, comprehensive guides & instructional videos.
Need Help? We are right here!
Thanks for your inquiry.
If you dont hear from us within 24 hours, please feel free to send a follow up email to info@xecurify.com
This privacy statement applies to miniorange websites describing how we handle the personal information. When you visit any website, it may store or retrieve the information on your browser, mostly in the form of the cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not directly identify you, but it can give you a more personalized web experience. Click on the category headings to check how we handle the cookies. For the privacy statement of our solutions you can refer to the privacy policy.
Necessary cookies help make a website fully usable by enabling the basic functions like site navigation, logging in, filling forms, etc. The cookies used for the functionality do not store any personal identifiable information. However, some parts of the website will not work properly without the cookies.
These cookies only collect aggregated information about the traffic of the website including - visitors, sources, page clicks and views, etc. This allows us to know more about our most and least popular pages along with users' interaction on the actionable elements and hence letting us improve the performance of our website as well as our services.