SSO is an add-on feature with OnRamp. Please contact Customer Success or support@onramp.us for more information.
Once enabled by OnRamp, users with Owner permissions can access SSO via Settings
2. Toggle SAML ON and get required setup data
Turn on the switch named âEnforce SAML SSOâ and note the âAssertion Consumer Service URLâ and âSAML Entity IDâ. Youâll need those in a moment (donât exit out of this page yet):
Go back to our OnRamp page and enter the URL you just copied into the field marked âSAML Metadata URLâ and click âEnable SAML SSOâ:
Nothing has happened yet, this provides OnRamp the metadata needed for the steps to configure this in Okta. Now, letâs go to Okta
Step 3: Create a new app integration in the Okta admin console
Login to your admin console for your Okta organization, click on âApplicationsâ, then âCreate App Integrationâ and select the option that reads âSAML2.0â and then click next:
Step 4: Configure the app in Okta
First, give the app a name. You may call it whatever you want, Iâm just calling it âOnRampâ. You also donât have to give it a logo, but if you want a logo, just reach out to us and we can send you one. Once youâve added those two things, click next.
Then, take those two values from before (the assertion consumer service URL and the SAML entity ID) and paste them into the Single sign on URL and Audience URI fields below. Also, make the NameID format âEmailAddressâ and the application username âEmailâ like we have below. All other fields may be left blank.
After you click next, youâll be taken to a feedback form provided by Okta, feel free to complete or skip this step.
Step 6: Get your SAML config from Okta
Weâre almost done! Now we just have to get our config from Okta to return back into our OnRamp config. On the page youâre taken to after you finish configuring the Okta app, if you scroll down a little bit, youâll find a button called âView SAML setup instructionsâ Click this button:
Now, on the page youâre on, note the fields called Identity Provider sign on URL and the x.509 certificate. Youâll need those for the next step. Back to OnRamp!
Step 7: Save the SAML config in OnRamp
Now, navigate back to your open OnRamp window to configure SSO and choose the SAML (Manual) option. Take those values you got from Okta, and paste them into the fields below (itâs OK if you donât have a logout URL. Thatâs normal). After a minute, you should get a notification in the top right corner of your application that says something along the lines of âSAML SSO Enabledâ:
NOTE: Users must log in to their account via app.onramp.us. Logging in through Okta directly (IdP initiated login) is not supported.
Congrats, SSO is now enabled in OnRamp. Please add any users you wish to use this connection to your application in Okta and to OnRamp itself.