SSO Troubleshooting¶
Common issues and solutions when configuring SAML SSO with Ogadu.
SSO Button Doesn't Appear on the Login Page¶
Symptoms: You enter your email on the Ogadu login page but no SSO button appears.
Solutions:
-
Check the email domain — The domain you're typing must exactly match one of the domains configured in Ogadu's SSO settings. For example, if SSO is configured for
acme.com, typinguser@acme.co.ukwon't trigger the SSO button. -
Verify SSO is enabled — Go to your organization settings in Ogadu and check that SSO is both saved and the Enable SSO toggle is on.
-
Test the API directly — Open your browser and go to:
You should seehttps://app.ogadu.com/api/sso/check-domain?email=you@yourdomain.com"sso_enabled": true. If you seefalse, the domain isn't configured or SSO isn't enabled.
"SAML Response Validation Failed"¶
Symptoms: After authenticating at Okta, you're redirected back to Ogadu with an error message about SAML validation.
Solutions:
Certificate mismatch¶
The most common cause. Ensure the X.509 certificate in Ogadu exactly matches the one from Okta.
- In Okta, go to your Ogadu app → Sign On tab.
- Download the certificate again.
- In Ogadu's SSO settings, click Edit and re-paste the full
certificate, including the
BEGINandENDlines. - Save and try again.
Clock skew¶
SAML assertions have a validity window of approximately 5 minutes. If your server's clock is significantly off, validation will fail.
- Ensure your server uses NTP (Network Time Protocol) for time synchronization.
- Check:
date -uon your server should be within a few seconds of the actual UTC time.
Audience mismatch¶
The SP Entity ID (Audience URI) in Okta must exactly match what Ogadu expects.
- In Okta, verify the Audience URI is:
https://app.ogadu.com/sso/saml/metadata/YOUR_ORG_ID - Check for typos, trailing slashes, or
httpvshttpsdifferences.
"Could Not Extract Email from SAML Response"¶
Symptoms: SAML validation succeeds but Ogadu can't find the user's email in the response.
Solutions:
-
Check Name ID format — In Okta, ensure the Name ID format is set to
EmailAddress. -
Check attribute statements — Verify that your Okta app includes the
emailattribute statement mapped touser.email. -
Check Application username — In Okta's app settings, ensure the Application username is set to
Email.
"SSO Session Expired"¶
Symptoms: After clicking the SSO button, you see "SSO session expired" before reaching Okta.
Solutions:
- The SSO state cookie is valid for 5 minutes. If you waited too long before being redirected to Okta, the cookie expired.
- Simply try again — click the SSO button once more.
- If this happens consistently, check that your browser isn't blocking cookies.
"Your Email Domain Is Not Authorized"¶
Symptoms: You successfully authenticate at Okta but get an error about your email domain not being authorized.
Solutions:
- The email address in your Okta profile doesn't match the email domains configured in Ogadu's SSO settings.
- In Ogadu SSO settings, add the missing domain to the Email Domains field.
- In Okta, verify the user's email attribute is set correctly.
User Authenticated but Not in the Organization¶
Symptoms: SSO sign-in works but the user doesn't see organizational projects or resources.
Solutions:
-
Check Okta assignments — The user must be assigned to the Ogadu app in Okta's Assignments tab.
-
Re-sign in — Organization membership is synced at login time. Ask the user to sign out and sign back in.
-
Check Cognito group — The user should be automatically added to the organization's Cognito group during SSO login. If this failed, check the server logs for errors.
IdP-Initiated SSO Not Working¶
Symptoms: Clicking the Ogadu tile in Okta's dashboard doesn't sign you in.
Solutions:
-
Check the Audience URI — For IdP-initiated SSO, Ogadu determines your organization from the SAML Audience restriction. The Audience URI in Okta must exactly match:
https://app.ogadu.com/sso/saml/metadata/YOUR_ORG_ID -
Check Okta assignments — Ensure the user is assigned to the app.
-
Check the ACS URL — Must be exactly:
https://app.ogadu.com/sso/saml/acs
SSO Works but User's Name Is Wrong¶
Symptoms: The user signs in via SSO but their display name in Ogadu is wrong or shows their email prefix instead of their real name.
Solutions:
-
Add or verify the attribute statements in Okta:
Name Value firstNameuser.firstNamelastNameuser.lastNamedisplayNameuser.displayName -
After updating attributes in Okta, the user needs to sign out and sign back in for the changes to take effect.
Certificate Expiration¶
Okta SAML certificates typically expire after 1-2 years. When the certificate expires, SSO will stop working.
How to check:
- In Ogadu SSO settings, click Test Connection.
- The test results show the certificate expiration date.
How to rotate:
- In Okta, go to your Ogadu app → Sign On tab.
- Generate a new certificate or download the current active one.
- In Ogadu SSO settings, click Edit.
- Paste the new certificate.
- Save and test.
Set a calendar reminder
Note your certificate's expiration date and set a reminder to rotate it at least 2 weeks before it expires.
"SSO Is Not Configured for This Organization"¶
Symptoms: Visiting the SSO login URL shows this error.
Solutions:
- Verify the Organization ID in the URL is correct:
https://app.ogadu.com/sso/login/YOUR_ORG_ID - Go to the organization settings page and check that SSO is configured and enabled.
Still Need Help?¶
If none of the above solutions resolve your issue:
- Check your server logs for detailed error messages (search for
SAMLorSSOin the logs). - In Okta, check the System Log (Reports → System Log) for SAML errors.
- Contact support@ogadu.com with:
- Your Organization ID
- The error message you're seeing
- The approximate time the error occurred
- Screenshots if possible