Configuring SSO with Okta
This article walks through setting up Okta as the Identity Provider (IdP) for The Mortgage Office (TMO).
SSO IS AN ENTERPRISE ONLY FEATURE
Step 1: Create a SAML Application in Okta
- Log in to the Okta admin console.
- Click the hamburger menu (top left) to open the left navigation.
- Navigate to Applications → Applications.
- Click Create App Integration.
- Select SAML 2.0 and click Next.
- In General Settings, enter an App Name (e.g., "TMO") and click Next.
- In SAML Settings, configure the following fields:
| Field | Value |
|---|---|
| Single sign-on URL | https://app.themortgageoffice.com/Saml2/Acs |
| Audience URI (SP Entity ID) | https://app.themortgageoffice.com/ |
| Default Relay State | Leave blank |
| Name ID Format | Can be left as "Unspecified" |
| Name | Name Format | Value |
|---|---|---|
email |
Unspecified | user.email |
Step 2: Assign Users to the TMO Application
Users must be assigned to the TMO application in Okta before they can use SSO.
- Navigate to Applications → Applications → TMO.
- Go to the Assignments tab (shown by default).
- Click Assign → Assign to People.
- A list of unassigned users is displayed. Click Assign next to each user you want to grant access.
- Click Save and Go Back.
Step 3: Gather the Okta Metadata
You will need two pieces of information from Okta to complete the TMO-side configuration:
Metadata URL
- Navigate to Applications → Applications → TMO.
- Select the Sign On tab.
- Scroll down to Metadata details.
- Copy the Metadata URL.
IdP Entity ID
- Open the Metadata URL you just copied in a browser.
- Look for the
entityIDattribute in the XML. It will look something like:entityID="http://www.okta.com/exkknioqxbvbqmMbF697" - Copy this value — you will enter it into TMO.
User Email
- In the Okta admin console, navigate to Directory → People.
- Note each user's Primary email. This email must match exactly what is configured for that user in TMO.
Step 4: Complete the TMO-Side Configuration
Now that Okta is set up, you need to configure TMO with your Okta IdP details and ensure users exist in TMO. Follow the steps in Setting Up SSO in TMO (All Identity Providers).
You will need the IdP Entity ID and Metadata URL gathered in Step 3.
Okta-Specific Behaviors
There are a few behaviors unique to Okta that are helpful to be aware of:
Name ID Format: Okta supports all Name ID formats. If there is a mismatch between the format requested by TMO (the SP) and the format configured in Okta, Okta will respond using its own configured format rather than honoring the SP's request. TMO handles this gracefully — no action is needed.
Assertion Encryption: Disabled by default in Okta.
Single Logout (SLO): Okta does not support IdP-initiated Single Logout. When a user logs out of TMO, the Okta session will not be terminated automatically.
Troubleshooting
If you encounter errors during setup or sign-in, see SSO Troubleshooting & Error Reference.