1. Knowledge Base
  2. Configure your Account and Create your First Event

How to Configure Single Sign-On (SSO) with Eventtia - OKTA

Single Sign-On (SSO) lets you access the Eventtia back office with your company credentials, simplifying and securing access without the need for a separate password. Follow this guide to set up SSO with our technical team.

 

Note: SSO is an add-on feature to your Eventtia license. If it’s not part of your initial contract, please contact your Customer Success Manager for further details.

What is Single Sign-On or SSO?

Single Sign-On (SSO) is an authentication method that allows access to multiple applications using a single set of credentials (e.g., your company login). Once logged in, you won’t need to re-enter your credentials to access Eventtia, making access more streamlined and secure.

Benefits of SSO on Eventtia

SSO simplifies and secures access to Eventtia for your team. By following these steps and collaborating with our technical team, you can easily enable SSO and enjoy seamless, secure access for your entire organization.

This document outlines the steps to integrate Single Sign-On (SSO) with Okta for two applications:

  1. Web Application (Back-Office): Uses SAML 2.0 for authentication.
  2. Mobile Application: Uses OAuth 2.0/OpenID Connect (OIDC) for authentication.

1.1. Creating a SAML 2.0 Application for the Web Application

  1. Log in to Okta Admin Console.
  2. Navigate to Applications > Create App Integration.
  3. Select SAML 2.0 and click Next.
  4. Configure the application details:
    • App Name: Choose a meaningful name.
    • Single Sign-On URL (Assertion Consumer Service URL): https://connect.eventtia.com/users/sso/saml/response
    • Audience URI (SP Entity ID): https://connect.eventtia.com
  5. Configure the required SAML attributes:
    • email: User’s email address.
  6. Save the configuration and download the Metadata XML file from Okta.
  7. Provide the following details from Okta to complete the integration:
    • Metadata URL or XML File from Okta.
    • Single Sign-On (SSO) URL.
    • Public X.509 Certificate used to sign SAML responses.

1.2. Creating an OAuth 2.0/OpenID Connect Application for the Mobile Application

  1. Navigate to Applications > Create App Integration.
  2. Select OIDC - OpenID Connect and choose Native App.
  3. Configure the application settings:
    • Client ID and Client Secret: These will be required by the mobile application.
    • Redirect URI: msauth://com.eventtia.onsite/logout/1s9P%2BK6ME47AN8IBIhaAo8xKtUg%3D
    • Allowed Grant Types: Enable Authorization Code and PKCE.
  4. Save the configuration.
  5. Provide the following details from Okta to complete the integration:
    • Issuer URL: Example: https://login.okta.com/oauth2/default
    • Client ID: A unique identifier generated in Okta.
    • Client Secret: A secret generated during client configuration to secure the connection.

We hope this article was useful.

Feel free to contact your Customer Success Manager if you have further questions.