Setting up custom SAML in Okta

Note: Only an admin of your Okta organization can create the application.

You can easily set up your custom SAML application in Okta. Postman provides you two ways to accomplish this. One of the ways you can easily configure is by using the readily-available Postman app in Okta to set up your custom SAML application instantly. Other way is to set up your custom SAML application without the Postman app in Okta.

This section describes the following two topics:

Setting up a custom SAML application in Okta

To set up custom SAML application, follow the procedure outlined below:

After you login to your Okta account, perform the following steps:

Okta - Step 1

Click Admin as illustrated in the following screen: okta admin

Okta - Step 2

From the Okta Dashboard, click Add Application. okta add application

Okta - Step 3

Click Create New App, as illustrated below: okta_new app

Okta - Step 4

In the following screen, ensure Web is selected as Platform. Select "SAML 2.0" and click Create. okta choose saml

Okta - Step 5

Under the first step "General Settings", enter an application name and then click Next. okta app name

Okta - Step 6

Under the second step “Configure SAML”, section A “SAML Settings”, enter the Postman service provider details which can be found on the Postman Edit Team Details page. To update the identity provider details, navigate to Authentication -> <MyOktaIntegrationName>_ and click Edit. Next, click Proceed. Ensure, you are in the following screen after the completion of this step: details

Now, download the encryption certificate by clicking Download as file link (shown in red circle). You will upload this later in the Okta SAML configuration section, which is explained below. In the following screen, click Show Advanced Settings link to configure advanced SAML assertion settings. !okta service provider

Field Value
Single Sign On URL ACS URL
Audience URI (SP Entity ID) Entity ID
Name ID Format EmailAddress

Okta - Step 7

Configure the options as shown below. Ensure your field options reflect these values. okta advanced

For the Encryption Certificate, upload the encryption file in the Encryption Certificate field shown above (remember, you downloaded the encryption file by clicking Download as a file link in Postman's Service Provider Details section earlier). Click Next to continue.

Okta - Step 8

Under the third step “Feedback”, select “I’m an Okta customer adding an internal app”, and check “This is an internal app that we have created”, and then click Finish. okta feedback

Okta - Step 9

Move over to the Sign On tab, and click the View Setup Instructions button. okta sign on

The View Setup Instructions screen comes populated with values that you should copy and paste in the Identity Provider Details section.

Note: You will need to come back to this screen to paste the value in Default Relay State that you will generate from the Postman's Identity Provide Details section.

Okta - Step 10

Copy the Identity Provider Single Sign-On URL, Identity Provider Issuer and X.509 Certificate from the below screen. okta identity provider

And paste them in the corresponding sections of the Identity Provider Details screen as shown below: details

Once you fill-in the details, click the Generate relay/Regenerate relay button to create a parameter to send with a SAML response in an IDP-initiated single sign-on. Copy the relay state and paste it in the following screen: details

To paste, click Edit button and paste the value in Default Relay State field.

Click Save Authentication.

Setting up a custom SAML application in Okta using Postman app

To set up custom SAML application using the Postman app, follow the procedure outlined below:

After you login to your Okta account, perform the following steps:

Postman - Step 1

Click Admin as illustrated in the following screen: okta admin

Postman - Step 2

From the Okta Dashboard, click Add Application. okta add application

Postman - Step 3

Enter Postman in the search bar and press enter, as illustrated below. Select Postman and click Add. okta add application

In the following screen, enter a name in the Application Label field and click Done. details

Postman - Step 4

Now, go to the Postman Edit Team Details page. To update the identity provider details, navigate to Authentication -> <MyOktaIntegrationName>_ and click Edit. Next, click Proceed. Ensure, you are in the following screen after the completion of this step: details

Now, download the encryption certificate by clicking Download as file link (shown in red circle). You will upload this later in the Okta SAML configuration section, which is explained below.

Navigate to your Okta account. Go to the Sign On tab and click Edit. details

The following screen opens: details

Click Browse and upload the encryption certificate. Click Save.

Postman - Step 5

Move over to the Sign On tab, and click the View Setup Instructions button. okta sign on

The View Setup Instructions screen comes populated with values that you should copy and paste in the Identity Provider Details section.

Note: You will need to come back to this screen to paste the value in Default Relay State that you will generate from the Postman's Identity Provide Details section.

Postman - Step 6

Copy the Identity Provider Single Sign-On URL, Identity Provider Issuer and X.509 Certificate from the below screen. okta identity provider

And paste them in the corresponding sections of the Identity Provider Details screen as shown below: details

Postman - Step 7

Once you fill-in the details, click the Generate relay/Regenerate relay button to create a parameter to send with a SAML response in an IDP-initiated single sign-on. Copy the relay state and paste it in the following screen: details

To paste, click Edit button and paste the value in Default Relay State field.

Click Save Authentication.