OKTA Single Sign-on Setup Guide

  • Updated

Zingtree supports SAML 2.0 based Single Sign-on (SSO). This lets you require anyone accessing a tree to log in via your Identity Provider and authenticate themselves first. This article will walk you through how to set it up using OKTA

Setup

 

1. In Zingtree select Team > SSO > (Agent/Author).

3. In OKTA, open the Admin settings. 

4. Select the Applications drop-down and then click Applications.

5. From the Applications page, click Create App Integration

6. Select SAML 2.0

7. Enter Zingtree Authors or Zingtree Agents in the App Name field. 

8. Enter the Single Sign-on URL and Entity ID. We recommend using email for both the Name ID Format and Application username. The completed page should look like this:

9. Select I'm an OKTA customer adding an internal app and then click Finish

10. Click View Setup Instructions. 

11. You'll need the ACS URL, Entity ID, and Certificate to finish setup in Zingtree. 

12. Click the button at the bottom-left to view Zingtree SSO URL's:

 

Enabling SSO for Agents/Authors

Once SSO is working properly from your test, you can restrict access to any tree as follows.

  1. From Team > SSO > (Agent/Author)
  2. Tick enable Agents/Authors.

IMPORTANT: You still need to specify individual trees to restrict access to. Here’s how:

  1. Go to My Trees, and select the tree that you want to require SSO login.
  2. Click Settings > Security, and you’ll see something like this:

  3. Check Require Login via Single Sign-on (SSO).
  4. Click Apply Settings.

Was this article helpful?

0 out of 0 found this helpful

Have more questions? Submit a request

Didn't find what you need?

Our friendly customer support team is here to help

Submit a Ticket

Looking for help or advice?

Reach out to our knowledgeable community of users.

Zingtree Community