Help Center
  • Home
  • Getting Started
    • Register with oAuth
    • Register with Email + Password
  • Formulas
    • Formulas
  • Migration Templates
    • Migration Templates
    • Setting up the Template
    • Magic ID
    • Running the Template
  • seeding
    • Summary
    • Data Types
    • Configuration
  • Jobs
    • Job Management
    • Migrate
    • Multi-Object
    • Upload
    • Mapping
    • Query
    • Preview
    • History
    • Retry
    • Rollback
    • Run Remaining
    • Wildcard Names
  • Formatting
    • Dataimporter Formatting
    • Replace Null Values
    • Deduplicate
    • Filter Data
    • Sample Data
    • Automation Control
  • Schedule
    • Schedule
    • Hour
    • Day
    • Month
    • Flow
  • Integrations
    • View Integrations
    • Database
      • Azure SQL Database
      • Heroku Postgres
      • MySQL
      • PostgreSQL
      • SQL Server
    • Storage
      • Dropbox
      • Google Drive
      • Google Sheets
      • OneDrive
      • S3
      • SFTP
      • SharePoint
  • Account Management
    • Billing
    • Access
    • Teams
    • Notifications
  • Security
    • Dataimporter Security
    • IP Addresses
    • Data Storage
    • Customer Managed Storage
    • Single Sign-On with Azure AD
    • Single Sign-On with Okta
    • Bring your own Key
  • Changelog
Powered by GitBook
On this page
  • 1. Enable SSO in Dataimporter
  • 2. Add Dataimporter to Okta
  • 3. Configuring SSO in Dataimporter
  1. Security

Single Sign-On with Okta

PreviousSingle Sign-On with Azure ADNextBring your own Key

Last updated 5 months ago

Follow this guide to set up Single Sign-On (SSO) in Dataimporter with Okta. This will let you control which users have access to Dataimporter, restrict access to SSO, provision new users via Just-in-Time (JIT) provisioning.

1. Enable SSO in Dataimporter

  1. In Dataimporter, head to the Account Settings page and toggle SSO on.

  1. In the SAML Name field enter the name as you would like it to appear e.g. Acme

  2. In the Domain field enter your corporate company name e.g. acme.com.

  3. Keep this tab open and open another tab to perform the next steps.

2. Add Dataimporter to Okta

  1. Log in to the Okta and click on Applications

  1. Click on Create App Integration.

  1. Select SAML 2.0 and click Next.

  1. Give the app the name DATAIMPORTER, upload a Logo (optional), and click Next.

  1. In the Audience URI (SP Entity ID) field, add the value that you added in Step 2 of the Dataimporter configuration e.g. Acme

  2. In the Single sign-on URL section enter the URL in the following format https://{instance}.dataimporter.io/saml/login/{identifier} e.g. https://app.dataimporter.io/saml/login/Acme

  1. Make sure you Check the box for User this for Recipient URL and Destination URL

  2. Scroll down to Attribute Statements and populate the following values.

  1. Scroll to the bottom of the page and click Next.

  2. Under the Feedback section select the option I'm an Okta customer adding an internal app and click the checkbox for This is an internal app that we have created. Click Finish.

  1. Click on Assignments -> Assign -> Assign to People

  1. Add any users who need access to Dataimporter.

  1. Click back on the Sign On tab and scroll down to the SAML Signing Certificates section.

  2. Click on Actions next for the SHA-2 type, and click on Download Certificate.

  3. Click on View IdP metadata

3. Configuring SSO in Dataimporter

  1. Copy the entityId value.

  1. Open the tab in Dataimporter and paste the value into the Provider Entity Id field.

  1. Open Okta and copy the Single Sign On Location value.

  1. Open the tab in Dataimporter and paste the value into the Log In URL field.

  1. Open the downloaded Certificate in a text editor and copy the entire value.

  2. Open the tab in Dataimporter and paste the value into the X509 Certificate field.

  1. Click on Save.

  2. Contact Dataimporter Support to validate and enable SSO for your Organization.