Okta SAML SSO feature is a paid feature.
If you’re using Infisical Cloud, then it is available under the Pro Tier. If you’re self-hosting Infisical, then you should contact [email protected] to purchase an enterprise license to use it.
Prepare the SAML SSO configuration in Infisical
In Infisical, head to your Organization Settings > Authentication > SAML SSO Configuration and select Set up SAML SSO.
Next, copy the Single sign-on URL and Audience URI (SP Entity ID) to use when configuring the Okta SAML 2.0 application.
Create a SAML application in Okta
In the Okta Admin Portal, select Applications > Applications from the navigation. On the Applications screen, select the Create App Integration button.
In the Create a New Application Integration dialog, select the SAML 2.0 radio button:
On the General Settings screen, give the application a unique name like Infisical and select Next.
On the Configure SAML screen, set the Single sign-on URL and Audience URI (SP Entity ID) from step 1.
If you’re self-hosting Infisical, then you will want to replace
https://app.infisical.com with your own domain.
Also on the Configure SAML screen, configure the Attribute Statements to map:
id -> user.id,
email -> user.email,
firstName -> user.firstName
lastName -> user.lastName
Once configured, select Next to proceed to the Feedback screen and select Finish.
Retrieve Identity Provider (IdP) Information from Okta
Once your application is created, select the Sign On tab for the app and select the View Setup Instructions button located on the right side of the screen:
Copy the Identity Provider Single Sign-On URL, the Identity Provider Issuer, and the X.509 Certificate to use when finishing configuring Okta SAML in Infisical.
Finish configuring SAML in Infisical
Back in Infisical, set Identity Provider Single Sign-On URL, Identity Provider Issuer, and Certificate to X.509 Certificate from step 3. Once you’ve done that, press Update to complete the required configuration.
Assign users in Okta to the application
Back in Okta, navigate to the Assignments tab and select Assign. You can assign access to the application on a user-by-user basis using the Assign to People option, or in-bulk using the Assign to Groups option.
At this point, you have configured everything you need within the context of the Okta Admin Portal.
Enable SAML SSO in Infisical
Enabling SAML SSO allows members in your organization to log into Infisical via Okta.
Enforce SAML SSO in Infisical
Enforcing SAML SSO ensures that members in your organization can only access Infisical by logging into the organization via Okta.
To enforce SAML SSO, you’re required to test out the SAML connection by successfully authenticating at least one Okta user with Infisical; Once you’ve completed this requirement, you can toggle the Enforce SAML SSO button to enforce SAML SSO.
We recommend ensuring that your account is provisioned the application in Okta prior to enforcing SAML SSO to prevent any unintended issues.
If you’re configuring SAML SSO on a self-hosted instance of Infisical, make sure to
SITE_URL environment variable for it to work:
AUTH_SECRET: A secret key used for signing and verifying JWT. This can be a random 32-byte base64 string generated with
openssl rand -base64 32.
SITE_URL: The URL of your self-hosted instance of Infisical - should be an absolute URL including the protocol (e.g. https://app.infisical.com)