Skip to main content

Set up single sign-on with SAML and Okta

Updated over a week ago
pro-feature_2x.png

You can use single sign-on in Timetastic using Okta as your identity provider.

Note: auto-provisioning is not supported by Timetastic.

Step 1. Okta setup

Start by logging into your Okta account and head to to 'Applications' from the main menu, then click the 'Add Application' button.

Timetastic_Screen_Shots_Frame__1_.png

Click on the 'Create New App' button in the top right hand corner.

Timetastic_Screen_Shots_Frame__1_.png

Choose Web from the 'Platform' drop down options and SAML 2.0 against the Sign on method, then click 'Create':

Timetastic_Screen_Shots_Frame__1_.png

Next, under General Settings, enter a name and logo for the App to make it easy for your users to identify Timetastic within Okta, then click 'Next'.

(You can download our App icon at the very bottom of this article.)

Timetastic_Screen_Shots_Frame__1_.png

For the next section Configure SAML, you'll need to grab some security details from your Timetastic account:

In Timetastic, head to SETTINGS > SECURITY. Click 'Set up SAML single sign-on'.

Security_Single_sign-on_Set_up_SAML_single_sign-on.png


Click the 'How to configure your Identity Provider' link to bring up your settings.

SSO_Configure_your_provider_settings.png

Copy the Assertion Consumer Service URL and paste it into the 'Single sign on URL' field in Okta.

Copy the Entity ID or Audience URI and paste it into the 'Audience URI (SP Entity ID)' field in Okta.

Okta_Configure_SAML_Settings2.png

If your Okta usernames are the same as your Timetastic user email addresses, you shouldn't need to change the other default settings.

If they aren't the same, just change the drop down against 'Application username' to a field that matches your user's Timetastic email address (most likely Email).

For SSO to work, these email addresses must match the users email address registered to Timetastic.

Once you've got the settings as you need them, click 'Next'.

Under Feedback, select 'I'm an Okta customer adding an internal app', then it's up to you if you want to offer any other information. Once you're done, click 'Finish'.

Timetastic_Screen_Shots_Frame__4_.png

You'll now need to give people access to the app in Okta.

Note: Flexible sign-on policies can be defined to change this, but for the purposes of this article we'll assume you're using the default.

To assign users to the Timetastic app, click the 'Assignments' tab on the Timetastic app details page and then the 'Assign' drop down to choose either People or Groups.

Timetastic_Screen_Shots_Frame__2_.png

Lastly, before you leave Okta, just click the 'Sign On' tab of the app and then the 'View Setup Instructions' button.

Timetastic_Screen_Shots_Frame__3_.png

Another tab will open up in your browser with the details you'll need to enter in Timetastic.

Okta_configuration_settings.png

Step 2. Timetastic setup

Now it's time to head over to Timetastic. Go back to SETTINGS > SECURITY and 'Set up SAML single sign-on'.

Security_Single_sign-on_Set_up_SAML_single_sign-on.png

In the 'SAML SSO URL' field, paste the 'Identity Provider Single Sign-On URL' value from Okta.

For 'Issuer entity ID', paste the 'Identity Provider Issuer' value from Okta.

For 'Public certificate', paste the 'X.509 Certificate' value from Okta.

Timetastic__50_.png

You can turn 'Force authentication' on, if you want users to have to re-enter their identity providers details. (This will only work if the identity providers also support this option)

To customise the Sign-in button, enter something useful, such as 'Okta' against 'Customisation'.

We'd recommend you test SSO is working correctly before making it mandatory.

Once you're happy with your settings, click 'Save changes', then you're good to go!

Here's the Timetastic logo to upload into Okta:

Did this answer your question?