Okta Single Sign-On (SSO) lets your team log in to OnRamp using your organization’s identity provider (IdP) credentials. This improves security and simplifies access management.
⚠️ SSO is an add-on feature in OnRamp. To enable it, contact Customer Success or email support@onramp.us.
Before You Begin
You must have Owner permissions in OnRamp.
You’ll need access to your Okta Admin Console.
Gather these values from OnRamp once SSO is toggled on:
Assertion Consumer Service (ACS) URL
SAML Entity ID
Steps to Follow
1. Enable SAML in OnRamp
In OnRamp, go to Settings > SSO.
Toggle Enforce SAML SSO to On.
Copy the Assertion Consumer Service URL and SAML Entity ID. Keep this tab open—you’ll need them for Okta.
2. Create a New SAML App in Okta
In your Okta Admin Console, go to Applications > Create App Integration.
Select SAML 2.0 as the sign-in method, then click Next.
Enter a name (e.g., OnRamp) and optionally upload the OnRamp logo.
Click Next to move to configuration.
3. Configure SAML Settings in Okta
In Single sign-on URL, paste the Assertion Consumer Service URL from OnRamp.
In Audience URI (SP Entity ID), paste the SAML Entity ID from OnRamp.
Set:
NameID format =
EmailAddress
Application username =
Email
Leave other fields blank and click Next.
(Optional) Complete or skip Okta’s feedback form.
4. Get Metadata from Okta
Once the app is created, go to your new Okta app’s Sign On tab.
Copy the Metadata URL.
5. Finish Setup in OnRamp
Return to the OnRamp SSO settings page.
Paste the Metadata URL into the SAML Metadata URL field.
Click Enable SAML SSO.
Wait for confirmation in OnRamp that SAML SSO is enabled.
Important Notes
Users must log in through app.onramp.us.
IdP-initiated logins from Okta are not supported.
Make sure users are added both in Okta and in OnRamp for SSO to work.