Setting Up SSO Login via Okta for InsideView Insights

  • Updated

This article explains how to create and configure SAML application in OKTA to enable single sign-on for Sales Intelligence Cloud. To learn about configuring SAML settings for custom packages, refer to the article Configuring SAML Settings for Custom Packages on our Knowledge Base. 

If you'd like to get a peek into InsideView security authentication overview, refer to the article InsideView Security Authentication Overview on our Knowledge Base. 

Okta is a SSO compliant application that allows you to connect to any application with primary and multi-factor authentication. To know more about Okta, visit their online documentation website.

In order to set up Single Sign-On (SSO) for Sales Intelligence Cloud via Okta, you must complete the following tasks. 

Configuring SAML Settings in OKTA for Sales Intelligence Cloud 

You must create and configure a SAML application in OKTA to redirect users to Sales Intelligence Cloud login.

Step Description Details
 1 Create a SAML Create a SAML application in OKTA for Insideview.

To learn how to create a SAML based Single Sign-On (SSO) from Okta, read this article Setting Up a SAML Application in Okta online documentation and follow these steps:

 2 Save Click Save.
 3 Edit the SAML application Go to the General tab and set Attribute Statements to EmailAddress|${}.
 4 Edit Sign-on settings

Go to the Sign-On tab and complete the following changes:

 5 Save Click Save.

Configuring STS Settings for Sales Intelligence Cloud Single Sign-On

Make sure that Sales Intelligence Cloud username is same as OKTA username to configure these settings.

Step Description Details
 1 Open Admin Page Log into Sales Intelligence Cloud with an account administrator's user credentials and go to the Account Admin page. 
 2 Add details Go to the Admin panel and click SingleSignOn Settings. The following page opens: 

Note: Use the above two check-boxes to restrict users of your account from using their credentials to login or change their passwords. As an account admin, you can use this feature to ensure your users login via SSO (like Okta). This feature provides foolproof security when the employee leaves a company. An account admin, however, can login with the credentials even when the check box is selected. 

 3 Enter the Attribute Statements To add STS details, click Add SAML button in the above screen. Ensure the STS details are entered in a single line with no spaces.

Enter the following details for SAML setting that you just create in Okta:

  • CRM Organization to Other
  • STS Name to a unique STS Name. For example, make sure the postback url is same as the stsName that you have defined in Okta.
  • SAMLp/WS-Fed Unsolicited Endpoint to okta insideview app redirect login URL. The endpoint should same as the one you defined in Okta Configuration. See Step 4 in the Configuring SAML Settings in Okta for Sales Intelligence Cloud.
  • In STS Certificate copy the content of the .cert file downloaded in Okta Configuration Step 3.
  • Set CRM Email Mapping to EmailAddress.


In the Add SAML dialog, enter the Attribute Statements you defined previously. All fields require an entry. Details like first name, last name, email, persistent name identifier (CRM User ID), and CRM Org ID, and so on must be configured in claims for federated authentication with SAML. Read the article Configuring SAML Settings for InsideView in Your CRM on our Knowledge Base and enter the required details here. 

 4 Finish the Configuration Click Save to finish the configuration.

Note: STS Name, SAML/WS-Fed Unsolicited Endpoint, STS Certificate, User ID, Email Mapping are mandatory fields. The Org ID, however, is an optional one. InsideView recommends email mapping and user ID be the same for ease-of-use. Also, note that the user ID coming from STS must belong to the same account where self-serve is configured. Just in case if a user is new, the system configures the user to the same account where SAML Self-serve is configured. You also need to ensure you provide an enterprise-wide unique name for the STS Name. Use the same STS name for your post-back URL. 

 5 Log in and Assign Okta application Log into Sales Intelligence Cloud and assign the Insideview Okta application to the users. Users can use this app in Okta to log into Sales Intelligence Cloud with SSO.

Note: Once the all of the above settings are completed for all users in an account, then any user with SSO configuration can log in seamlessly via Okta into Sales Intelligence Cloud. 



Was this article helpful?

0 out of 0 found this helpful