Okta Connection

The Okta integration connects Revspire to your Okta org for SAML-based login.

Purpose

Allow users assigned in Okta to authenticate into Revspire using organization SSO policy.

Before you start

  • Admin access in Okta.
  • Users or groups assigned to the Revspire app in Okta.
  • In Revspire Setup > SSO, copy ACS URL, SP Entity ID, SP Login URL, and SP Logout URL.
  • Optional: download Revspire SP signing certificate if your security policy requires SP cert trust setup.

Steps

Step 1: Create SAML app in Okta

  1. In Okta Admin, create a new SAML 2.0 app integration for Revspire.
  2. Set Single sign on URL to Revspire ACS URL.
  3. Set Audience URI (SP Entity ID) to Revspire SP Entity ID.
  4. Set NameID format/value (typically email) based on your user identity policy.
  5. Assign users/groups that need Revspire access.

Step 2: Collect Okta IdP values

From Okta app sign-on details, copy:

  • Issuer Entity ID
  • SSO URL (IdP Login URL)
  • X.509 certificate

Step 3: Add Okta provider in Revspire

  1. Go to Setup > SSO.
  2. Click Add and choose Okta.
  3. Enter Issuer Entity ID, SSO URL, and X.509 certificate.
  4. (Optional) enable Set as primary provider.
  5. Save and test login.

Step 4: Configure login policy

  • Optional mode: password + SSO available.
  • Enforced mode: SSO-only login.

Troubleshooting

  • If setup fails, verify SSO URL is HTTPS.
  • If users cannot log in, confirm they are assigned in Okta and provisioned as active users in Revspire.
  • If NameID does not match Revspire username/email, update Okta claim mapping.