Okta SAML SSO is a paid feature.

If you’re using Infisical Cloud, then it is available under the Pro Tier. If you’re self-hosting Infisical, then you should contact [email protected] to purchase an enterprise license to use it.

1

Prepare the SAML SSO configuration in Infisical

In Infisical, head to your Organization Settings > Authentication > SAML SSO Configuration and select Set up SAML SSO.

Next, copy the Single sign-on URL and Audience URI (SP Entity ID) to use when configuring the Okta SAML 2.0 application. Okta SAML initial configuration

2

Create a SAML application in Okta

In the Okta Admin Portal, select Applications > Applications from the navigation. On the Applications screen, select the Create App Integration button.

SAML Okta create app integration

In the Create a New Application Integration dialog, select the SAML 2.0 radio button:

SAML Okta create SAML 2.0 integration

On the General Settings screen, give the application a unique name like Infisical and select Next.

SAML Okta create SAML 2.0 integration

On the Configure SAML screen, set the Single sign-on URL and Audience URI (SP Entity ID) from step 1.

SAML Okta configure IdP fields

If you’re self-hosting Infisical, then you will want to replace https://app.infisical.com with your own domain.

Also on the Configure SAML screen, configure the Attribute Statements to map:

  • id -> user.id,
  • email -> user.email,
  • firstName -> user.firstName
  • lastName -> user.lastName

SAML Okta attribute statements

Once configured, select Next to proceed to the Feedback screen and select Finish.

3

Retrieve Identity Provider (IdP) Information from Okta

Once your application is created, select the Sign On tab for the app and select the View Setup Instructions button located on the right side of the screen:

SAML Okta view setup instructions

Copy the Identity Provider Single Sign-On URL, the Identity Provider Issuer, and the X.509 Certificate to use when finishing configuring Okta SAML in Infisical.

SAML Okta IdP values

4

Finish configuring SAML in Infisical

Back in Infisical, set Identity Provider Single Sign-On URL, Identity Provider Issuer, and Certificate to X.509 Certificate from step 3. Once you’ve done that, press Update to complete the required configuration.

SAML Okta paste values into Infisical

5

Assign users in Okta to the application

Back in Okta, navigate to the Assignments tab and select Assign. You can assign access to the application on a user-by-user basis using the Assign to People option, or in-bulk using the Assign to Groups option.

SAML Okta assignment

At this point, you have configured everything you need within the context of the Okta Admin Portal.

6

Enable SAML SSO in Infisical

Enabling SAML SSO allows members in your organization to log into Infisical via Okta.

SAML Okta enable SAML

7

Enforce SAML SSO in Infisical

Enforcing SAML SSO ensures that members in your organization can only access Infisical by logging into the organization via Okta.

To enforce SAML SSO, you’re required to test out the SAML connection by successfully authenticating at least one Okta user with Infisical; Once you’ve completed this requirement, you can toggle the Enforce SAML SSO button to enforce SAML SSO.

We recommend ensuring that your account is provisioned the application in Okta prior to enforcing SAML SSO to prevent any unintended issues.

If you’re configuring SAML SSO on a self-hosted instance of Infisical, make sure to set the AUTH_SECRET and SITE_URL environment variable for it to work:

  • AUTH_SECRET: A secret key used for signing and verifying JWT. This can be a random 32-byte base64 string generated with openssl rand -base64 32.
  • SITE_URL: The URL of your self-hosted instance of Infisical - should be an absolute URL including the protocol (e.g. https://app.infisical.com)