Implement SAML SSO using Okta

Configure a connection to Okta via SAML.

Step 1: Request SSO Setup

Start by reaching out to your Customer Success Manager to ensure your current plan allows SSO setup. Then loop in the Support Team ([email protected]) and ask them to kickstart the process.

Step 2: Configure the connection between your Identity Provider (IdP) and Synthesia’s SSO service provider

  1. After the support team sends you the WorkOS setup link, please click on it and follow the Admin Portal instructions
  2. You will see a list of the IdP providers available. Choose the one you need and follow the corresponding step-by-step guidelines on how to configure the IdP settings.

Once done, you will be able to test your SSO integration with that identity provider.

Configure Single Sign-On - WorkOS

Step 3: Create a SAML Integration

  1. Sign in to the Okta admin console.
  2. In the left navigation menu, expand the Application section and select the Applications tab.

Dashboard - Okta admin console

  1. Click Create App Integration.

Applications - Okta admin console

  1. In the Create a new app integration dialog, select SAML 2.0 and click Next.

Create a new app integration dialog

  1. The Create SAML Integration wizard will open. For the General Settings step, enter an appropriate app name, such as "Synthesia". Optionally, you can upload an app logo. Click Next.

Create SAML Integration wizard

  1. On the Configure SAML step, locate the Single Sign-On URL and Audience URI (SP Entity ID) fields.
  2. Copy the values from the WorkOS setup guide you received and paste them into their respective fields in the Okta admin console.
Single sign-on URLAudience URI
https://studio.auth.synthesia.io/saml2/idpresponseurn:amazon:cognito:sp:eu-west-1_7hEawdalF

Single sign-on URL and Audience URI (SP Entity ID) fields - Create SAML Integration wizard

  1. Scroll down to the bottom of the page, then click Next.

Click Next to continue - Create SAML Integration wizard

Step 4: Submit Application Feedback

On the Feedback step, check the This is an internal app that we have created option, then click Finish.

Step 5: Set Identity Provider Metadata

  1. Choose either Dynamic configuration (recommended) or Manual configuration (enter identity provider details).
  2. On the Sign On tab, in the Metadata details section, locate the Metadata URL and click on the Copy button.

Metadata details - Set Identity Provider Metadata

  1. Paste the value into the Identity provider metadata URL field in the WorkOS setup guide to continue to the next step.

Step 6: Configure SAML Attributes

Depending on which features have been enabled on your Okta instance, SAML attribute configuration can be located in different areas of the Okta admin console.

  1. On the application settings page, ensure that the _Sign On _tab is selected.

Sign On tab - Application settings

  1. Scroll down to the SAML Attributes section and click Edit.

SAML Attributes - Application settings

  1. Add the attribute statements listed below. The name format can be left unspecified.
NameValue
id (Required)user.id
email (Required)user.email
firstName (Required)user.firstName
lastName (Required)user.lastName

Profile attribute statements - Application settings

  1. Click Next, then on the final step of the wizard, click Finish.

Finish editing SAML Integration

Step 7: Assign Groups to the SAML App

  1. On the application settings page, select the Assignments tab.
  2. Click Assign and select Assign to Groups.
  1. Assign the appropriate groups to the application. When you are finished, click Done.

Step 8: Test Single Sign-On

Test configure a connection to Okta via SAML.signing in with Okta at the last stage of the WorkOS guide to verify that the single sign-on connection was configured correctly.

When you finish the setup, you should get the SSO successful test notification, which would mean that the connection between WorkOS and your IdP was established:

SSO Test succeeded notification

Step 9: Enforce SSO

After a successful test, please reach out to the Synthesia support team, who will send you a test login link to try accessing your account with SSO and after you confirm a successful attempt, they will be able to enforce your SSO in production.

Be sure to include:

  • A validation that the tests worked
  • A list of domain names managed by your IdP (e.g. synthesia.io)