# Okta

Go into your **Okta admin console** (it should look like this: `https://<your_url>.okta.com/admin/dashboard`)

1. In the sidebar menu, click on **Applications > Applications**&#x20;

   <figure><img src="/files/j7lLB3TpBO967Vl8i3Wp" alt=""><figcaption></figcaption></figure>
2. Click now on **Create App Integration**

   <figure><img src="/files/UnzHK2ntCrY7Hq96MIyG" alt=""><figcaption></figcaption></figure>
3. Select **SAML 2.0** and click on **Next**&#x20;

   <figure><img src="/files/mddemwxcl5wZdg7XRfDG" alt=""><figcaption></figcaption></figure>
4. Choose an **App name** and click on **Next**&#x20;

   <figure><img src="/files/L4nWFGkPTVxcUo9R7sfN" alt=""><figcaption></figcaption></figure>
5. Add the **Single sign-on** **URL**: `<base_url>/api/accounts/saml/0/acs/`  (for example with localhost: `https://localhost:8443/api/accounts/saml/0/acs/`) (see screenshot below)
6. Add the **Audience URI (**<mark style="color:purple;">**SP Entity ID**</mark>**),** it has to be the same than <mark style="color:purple;">**SP Entity ID**</mark> in CISO Assistant (see screenshot below)
7. Choose **Email** as the **Application username**&#x20;

   <figure><img src="/files/1cnkPsJTtQl1TvYT7llZ" alt=""><figcaption></figcaption></figure>
8. Add **Attribute Statements**

   * `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname` for user's first name
   * `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname` for user's last name&#x20;

   <figure><img src="/files/RgrBhkuRRn0a9Gp0UtqJ" alt=""><figcaption></figcaption></figure>
9. Click on **Next** and fill in the **Feedback** page as you wish then click on **Finish**&#x20;

   <figure><img src="/files/J3B5tMfczaHMZl6olAwy" alt=""><figcaption></figcaption></figure>

   <figure><img src="/files/dul1nFd1bIxF0PM7gy3J" alt=""><figcaption></figcaption></figure>
10. In the **Settings** box inside **SAML 2.0:**

    * Copy  the <mark style="color:purple;">**Metadata URL**</mark> and paste it into the <mark style="color:purple;">**Metadata URL**</mark> field in CISO Assistant
    * Copy the **Issuer** url and paste it into the <mark style="color:purple;">**IdP Entity ID**</mark> field in CISO Assistant

    <figure><img src="/files/8fwoWYAtLk60wvulN1Fe" alt=""><figcaption></figcaption></figure>
11. Go to the **Assignments** tab&#x20;

    <figure><img src="/files/LfknJZXS1B1RClWJlvsd" alt=""><figcaption></figcaption></figure>
12. Click on **Assign** and choose whether you want to assign users or specific groups&#x20;

    <figure><img src="/files/M5EwOw01wc1LhR2AnFyA" alt=""><figcaption></figcaption></figure>

{% hint style="warning" %} <mark style="color:orange;">Add a user in your application doesn't automatically create the user on CISO Assistant</mark>
{% endhint %}

You can now [configure CISO Assistant](https://intuitem.gitbook.io/ciso-assistant/features-highlights/sso#configure-ciso-assistant-with-saml) with the <mark style="color:purple;">**3 parameters**</mark> you've retrieved.


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://intuitem.gitbook.io/ciso-assistant/features-focus/sso/identity-providers/okta.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
