Configure Ogadu SSO with Okta¶
This guide walks you through setting up SAML 2.0 Single Sign-On between Okta and Ogadu. After completing these steps, your team members can sign in to Ogadu using their Okta credentials.
Prerequisites¶
Before you begin, make sure you have:
- [x] An Ogadu account with organization admin access
- [x] An Okta admin account with permission to configure applications
- [x] Your Ogadu Organization ID (found in your organization settings)
Step 1: Find Your Ogadu Organization ID and SP Details¶
- Sign in to Ogadu.
- Navigate to your organization's settings page from the sidebar.
- Scroll down to the Single Sign-On (SSO) section.
-
You'll see the SP Metadata URL — it contains your Organization ID.
For example, if the metadata URL is:
Then your Organization ID ishttps://app.ogadu.com/sso/saml/metadata/acme-corp-x7k2acme-corp-x7k2. -
Keep this page open — you'll need it in Step 3.
Copy the Metadata URL
Click the Copy button next to the metadata URL. You may need this URL if configuring Okta manually.
Step 2: Add Ogadu in Okta¶
Option A: From the Okta Integration Network (Recommended)¶
- Sign in to your Okta Admin Console.
- Go to Applications → Browse App Catalog.
- Search for Ogadu.
- Click Add Integration.
- In General Settings, enter your Ogadu Organization ID.
- Click Done.
- Continue to Step 3.
Option B: Manual SAML Configuration¶
If Ogadu isn't available in your Okta catalog yet, create a custom SAML app:
- Sign in to your Okta Admin Console.
- Go to Applications → Applications → Create App Integration.
- Select SAML 2.0 and click Next.
-
Enter the following:
Setting Value App name OgaduApp logo Upload your company's Ogadu logo (optional) -
Click Next and configure the SAML settings:
Setting Value Single sign-on URL https://app.ogadu.com/sso/saml/acsUse this for Recipient URL and Destination URL Checked
Audience URI (SP Entity ID) https://app.ogadu.com/sso/saml/metadata/YOUR_ORG_IDDefault RelayState (leave blank) Name ID format EmailAddressApplication username EmailReplace YOUR_ORG_ID
Replace
YOUR_ORG_IDwith your actual Ogadu Organization ID from Step 1 (e.g.,acme-corp-x7k2). -
Add the following Attribute Statements:
Name Name format Value emailBasic user.emailfirstNameBasic user.firstNamelastNameBasic user.lastNamedisplayNameBasic user.displayName -
Click Next, then Finish.
Step 3: Copy IdP Details to Ogadu¶
After creating the Okta app, you need to copy three values from Okta to Ogadu.
- In Okta, go to your Ogadu application's Sign On tab.
-
Click View SAML setup instructions, or expand More details to find the following values:
Value Where to find it IdP Entity ID Listed as "Identity Provider Issuer" IdP SSO URL Listed as "Identity Provider Single Sign-On URL" X.509 Certificate Click "Download certificate" -
In Ogadu, go to your organization's SSO settings (from Step 1).
-
Enter the IdP details:
- IdP Entity ID — Paste the Identity Provider Issuer URL
- IdP SSO URL — Paste the Single Sign-On URL
- IdP Certificate (PEM) — Paste the full certificate content,
including the
-----BEGIN CERTIFICATE-----and-----END CERTIFICATE-----lines
-
Enter your Email Domains — the email domains your team uses (e.g.,
acme.com, acme.co.uk). Separate multiple domains with commas.What are email domains used for?
When a user enters their email on the Ogadu login page, Ogadu checks the domain. If it matches a configured SSO domain, the SSO sign-in button automatically appears.
-
Click Save SSO Configuration.
Step 4: Test the Connection¶
- In Ogadu's SSO settings, click Test Connection.
- Verify that all checks pass:
IdP Entity ID is valid
IdP SSO URL is reachable
Certificate is parseable and not expired
Test failed?
See Troubleshooting for common issues and solutions.
Step 5: Assign Users in Okta¶
Users must be assigned to the Ogadu app in Okta before they can use SSO.
- In Okta, go to your Ogadu application's Assignments tab.
- Click Assign → Assign to People (or Assign to Groups).
- Select the users or groups who should have access.
- Click Save and Go Back, then Done.
Just-In-Time Provisioning
When an assigned user signs in via SSO for the first time, Ogadu automatically creates their account and adds them to your organization. You don't need to create Ogadu accounts in advance.
Step 6: Test SSO Sign-In¶
Test SP-Initiated Flow (from Ogadu)¶
- Open a private/incognito browser window.
- Go to https://app.ogadu.com/auth/login.
- Enter an email address with your configured domain
(e.g.,
alice@acme.com). - Tab out of the email field — an SSO button should appear: "Sign in with [Your Organization]".
- Click the SSO button.
- Authenticate at Okta.
- You should be redirected back to Ogadu and signed in.
Test IdP-Initiated Flow (from Okta)¶
- Sign in to your Okta End-User Dashboard.
- Find the Ogadu app tile.
- Click it.
- You should be signed in to Ogadu automatically.
Both tests passed?
SSO is working correctly. You can now optionally enforce SSO in Step 7.
Step 7: Enforce SSO (Optional)¶
If you want to require all users with your email domain to use SSO (blocking password login):
- In Ogadu's SSO settings, enable the Require SSO toggle.
- Click Save or wait for the toggle to save automatically.
When enforced:
- Users with matching email domains who try to log in with a password are automatically redirected to Okta.
- The password form is hidden and replaced with a redirect notice.
Test before enforcing
Make sure SSO is working correctly for all your users before enabling enforcement. If SSO breaks while enforced, users won't be able to sign in with passwords as a fallback.
Platform administrators can always sign in with a password regardless of SSO enforcement.
Step 8: Share the SSO Login URL (Optional)¶
You can share a direct SSO login URL with your team:
https://app.ogadu.com/sso/login/YOUR_ORG_ID
This URL immediately redirects users to Okta for authentication, bypassing the email detection step on the login page.
SAML Configuration Reference¶
| Property | Value |
|---|---|
| ACS URL | https://app.ogadu.com/sso/saml/acs |
| SP Entity ID | https://app.ogadu.com/sso/saml/metadata/YOUR_ORG_ID |
| SP Metadata URL | https://app.ogadu.com/sso/saml/metadata/YOUR_ORG_ID |
| Name ID Format | urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress |
| Signature Algorithm | RSA-SHA256 |
| Assertion Signed | Required |
| SP-initiated SSO | Supported |
| IdP-initiated SSO | Supported |
| JIT Provisioning | Supported |
Need Help?¶
- Check the Troubleshooting guide for common issues
- Contact support@ogadu.com for assistance