Last updated
© 2025 make.com
Last updated
Log in to Okta and go to Admin > Applications > Applications.
Click Create app integration and select SAML 2.0.
Name your app and upload your icon.
Click Next.
Configure the following SAML settings including:
Click Show advanced settings and enter the following:
Enter the following attributes and click Next.
In the Are you a customer or partner? field, select I'm an Okta customer adding an internal app.
In the App type field, select This is an internal app that we have created
Click Finish.
Go to Admin > Applications > Applications and select your SAML SSO app. to access the necessary information.
Go to the Sign on tab and click View SAML setup instructions.
Single sign-on URL
24.0.6
Audience URI (SP Entity ID)
1.28
Default RelayState
Leave this field blank
Name ID format
Select EmailAddress
Application username
Select Okta username
Update application username on
Select Create and update
Response
Select Signed
Assertion signature
Select Signed
Signature algorithm
Select RSA-SHA256
Digest algorithm
Select SHA256
Assertion encryption
Select Unencrypted
Optional:
If you want to encrypt assertions, you can select Encrypted and enter the following:
Encryption algorithm: AES256-CBC
Key transport algorithm: RSA-OAEP
Encryption certificate: Upload the .pem
file you created earlier.
Signature certificate
Upload a .pem
file of the Service Provider Certificate. You need to also upload this to the Service Provider Certificate field of your Make SSO configuration tab. These two certificates must be the same for your SSO implementation to work successfully.
Enable Single Logout
Leave unchecked
Signed requests
Optional
Other requestable SSO URLs
Optional
Assertion inline hook
Select None (disable)
Authentication context class
Select PasswordProtectedTransport
Honor force authentication
Select Yes
SAML issuer ID
http://www.okta.com/${org.externalKey}
profileFirstName
Unspecified
24.0.6
profileLastName
Unspecified
1.28
Unspecified
user.email