Skip to main content
Configure SSO for your Yasu workspace using Okta as your identity provider.
Before starting, complete the generic SSO setup prerequisites and have the SAML configuration values from Yasu’s SSO page ready.
1

Create a SAML application

  1. Sign in to the Okta Admin Console
  2. Go to ApplicationsApplicationsCreate App Integration
  3. Select SAML 2.0 and click Next
  4. Name the application (e.g., “Yasu”) and click Next
2

Configure SAML settings

  1. Single sign-on URL → paste the ACS URL from Yasu’s SSO page
  2. Audience URI (SP Entity ID) → paste the Entity ID from Yasu’s SSO page
  3. Name ID format → select EmailAddress
  4. Application username → select Email
3

Configure attribute statements

Under Attribute Statements (Optional), add:
NameValue
emailuser.email
FirstNameuser.firstName
LastNameuser.lastName
displayNameuser.displayName
Under Group Attribute Statements (Optional), add:
NameFilterValue
groupsMatches regex.*
This sends all group memberships. You can use a more specific filter to limit which groups are sent. Group attribute statements are required if you want to use role mapping.
Click Next, then select your feedback option and click Finish.
4

Download metadata and configure Yasu

  1. On the application page, go to the Sign On tab
  2. Under SAML Signing Certificates, click ActionsView IdP metadata
  3. Copy all the XML content (or right-click and save)
  4. In Yasu, go to IntegrationsSSO Configuration and click Configure SSO
  5. Select Okta as the identity provider
  6. Enter your company domain
  7. Paste the metadata XML
  8. Click Add Domain
5

Assign users and groups

  1. Go to the Assignments tab of the Okta application
  2. Click AssignAssign to People or Assign to Groups
  3. Select the users or groups and click AssignDone
Assigned users can now sign in to Yasu via SSO. New users will be automatically provisioned via JIT provisioning.

Attribute Mapping Reference

When configuring attribute mapping in Yasu for Okta, use these values:
Yasu fieldOkta attribute
Name attributedisplayName
Picture attributeprofileUrl
Groups/role attributegroups
These are auto-configured when you select Okta as the identity provider during setup.