Skip to main content

Set Up Okta SSO in OnRamp

Okta Single Sign-On (SSO) lets your team log in to OnRamp using your organization’s identity provider (IdP) credentials.

Melissa Scatena avatar
Written by Melissa Scatena
Updated over a month ago

Okta Single Sign-On (SSO) lets your team log in to OnRamp using your organization’s identity provider (IdP) credentials. This improves security and simplifies access management.

⚠️ SSO is an add-on feature in OnRamp. To enable it, contact Customer Success or email support@onramp.us.


Before You Begin

  • You must have Owner permissions in OnRamp.

  • You’ll need access to your Okta Admin Console.

  • Gather these values from OnRamp once SSO is toggled on:

    • Assertion Consumer Service (ACS) URL

    • SAML Entity ID


Steps to Follow

1. Enable SAML in OnRamp

  1. In OnRamp, go to Settings > SSO.

  2. Toggle Enforce SAML SSO to On.

  3. Copy the Assertion Consumer Service URL and SAML Entity ID. Keep this tab open—you’ll need them for Okta.


2. Create a New SAML App in Okta

  1. In your Okta Admin Console, go to Applications > Create App Integration.

  2. Select SAML 2.0 as the sign-in method, then click Next.

  3. Enter a name (e.g., OnRamp) and optionally upload the OnRamp logo.

  4. Click Next to move to configuration.


3. Configure SAML Settings in Okta

  1. In Single sign-on URL, paste the Assertion Consumer Service URL from OnRamp.

  2. In Audience URI (SP Entity ID), paste the SAML Entity ID from OnRamp.

  3. Set:

    • NameID format = EmailAddress

    • Application username = Email

  4. Leave other fields blank and click Next.

  5. (Optional) Complete or skip Okta’s feedback form.


4. Get Metadata from Okta

  1. Once the app is created, go to your new Okta app’s Sign On tab.

  2. Copy the Metadata URL.


5. Finish Setup in OnRamp

  1. Return to the OnRamp SSO settings page.

  2. Paste the Metadata URL into the SAML Metadata URL field.

  3. Click Enable SAML SSO.

  4. Wait for confirmation in OnRamp that SAML SSO is enabled.


Important Notes

  • Users must log in through app.onramp.us.

  • IdP-initiated logins from Okta are not supported.

  • Make sure users are added both in Okta and in OnRamp for SSO to work.


Did this answer your question?