The Okta integration connects Revspire to your Okta org for SAML-based login.
Purpose
Allow users assigned in Okta to authenticate into Revspire using organization SSO policy.
Before you start
- Admin access in Okta.
- Users or groups assigned to the Revspire app in Okta.
- In Revspire Setup > SSO, copy ACS URL, SP Entity ID, SP Login URL, and SP Logout URL.
- Optional: download Revspire SP signing certificate if your security policy requires SP cert trust setup.
Steps
Step 1: Create SAML app in Okta
- In Okta Admin, create a new SAML 2.0 app integration for Revspire.
- Set Single sign on URL to Revspire ACS URL.
- Set Audience URI (SP Entity ID) to Revspire SP Entity ID.
- Set NameID format/value (typically email) based on your user identity policy.
- Assign users/groups that need Revspire access.
Step 2: Collect Okta IdP values
From Okta app sign-on details, copy:
- Issuer Entity ID
- SSO URL (IdP Login URL)
- X.509 certificate
Step 3: Add Okta provider in Revspire
- Go to Setup > SSO.
- Click Add and choose Okta.
- Enter Issuer Entity ID, SSO URL, and X.509 certificate.
- (Optional) enable Set as primary provider.
- Save and test login.
Step 4: Configure login policy
- Optional mode: password + SSO available.
- Enforced mode: SSO-only login.
Troubleshooting
- If setup fails, verify SSO URL is HTTPS.
- If users cannot log in, confirm they are assigned in Okta and provisioned as active users in Revspire.
- If NameID does not match Revspire username/email, update Okta claim mapping.