Salesforce

SSO configuration steps in Okta IdP

« Go Back

Information

 
Answer
This supplementary document is to help you set up SSO for Tango portal with your Okta Identity Provider (IdP). You must first configure your IdP as an admin to create an entry for Tango portal Single Sign-On (SSO). Consult with your company’s IdP expert for the latest IdP configuration steps and instructions.
 
Note: This document is created in August 2024. We’re only providing a general guidance to get you started. For up-to-date procedure and screenshots, refer to the your IdP documentation.

 

Disclaimer: Tango has no affiliation with Okta. Tango makes no warranty of any kind, whether express or implied, with regard to any third party products, third party content, or third party services. Tango will not be liable for loss damage, cost or expense, whatsoever resulting from this guide. This guide is provided as a courtesy. To confirm accuracy or completeness of this guide, please consult with Okta directly.

 

In this article you can find: 

Requirements

  • An IdP account with admin permissions

  • A Tango portal account with manage authentication permissions

 

OKTA OIDC SSO configuration steps

To set up SSO with Okta OIDC for the Tango platform, you need an administrator account access to your IdP provider. Log in to your IdP and create and entry for the new SSO. Find out Connection display name, Client ID, and OpenID Connection ID Token Issuer URL in your IdP before continuing in Tango portal.

To set up Okta OIDC:

  1. Log in to your Okta IdP with an admin account.

  2. Go to Applications and click Create App Integration.

okta1.png

  1. Select OIDC OpenID Connect and Web Application.
     

 

okta-new-application.png

  1. Click Next.

  2. Under General tab > General Settings:

    1. Enter a name in the App integration name field, such as “Tango OIDC”. You can use this name as Connection display name in Tango.
       

      okta3.png

       

    2. Select Implicit (Hybrid) for Grant type.

    3. For Controlled access, select everyone in your organization or limit users.

    4. Click Save.

  3. Under General tab > Client Credentials:

    Click to copy the Client ID value. You need it later to Add SSO connection in Tango portal.

    okta4.png

  4. Under Sign On tab:

    1. Click the drop-down menu next to Issuer and select the Okta URL link. You need to enter this link later in the OpenID Connection ID Token Issuer URL field when configuring Tango portal. The URL link will be automatically appended with the following extension as soon as you paste it in Tango portal: (/.well-known/openid-configuration). See how to Add SSO connection in Tango portal.

      okta5.png
    2. Click Save.

  5. Click Edit next to General settings > Login:

    1. For Sign-in redirect URIs, paste one of the following links based on your environment:

    2. Click Save.

  6. Follow the remaining steps in Tango portal. See how to Add SSO connection in Tango portal.

 

 

 

OKTA SAML SSO configuration steps

To set up SSO with Okta SAML for the Tango platform, you need an administrator account access to your IdP provider. Log in to your IdP and create and entry for the new SSO. Find out Connection display name, Entity ID, and Metadata URL in your IdP before continuing in Tango portal.

 

To set up Okta SAML SSO:

  1. Log in to Okta IdP with an admin account.

  2. Go to Applications > Create App Integration.
     

    okta7.png
  3. Select SAML 2.0 and click Next.

  4. Under General tab > General Settings:

    Enter a value for the App name, such as “Tango SAML SSO”, and click Next.
     

    okta8.png
  5. Paste the following attributes from Tango portal under Create SAML Integration > Attribute Statements. See how to Add SSO connection in Tango portal.

Tango attributes*

Okta defaults

given_name

user.firstName

family_name

user.lastName

email

user.email

username

user.login

email_verified

true

*For other IdPs, refer to the IdP documentation to find out their attribute names.


 

okta9.png

  1. Click Next and Finish.

  2. In the Assignments tab:

    1. Click Convert Assignments and select Convert all from the drop-down menu.
       

      okta10.png
    2. Select Groups or People to assign to this new SAML SSO connection, and click Done.

    3. Click Copy next to Metadata URL and add the link to Tango portal. See how to Add SSO connection in Tango portal.

      okta11.png
  3. Continue the SSO configuration in Tango Portal. See Add SSO connection in Tango portal.

 

Add a tile in Okta for OIDC SSO connection

You can add a tile for the newly created Tango OIDC SSO connection to your Okta dashboard. To start, make sure you have enabled the SSO in Tango portal. Log in to your Okta IdP and follow the instructions below:

To add Tango SSO tile:

  1. Log in to Okta IdP using your admin account

  2. Select your Tango application OIDC on the list.

  3. Go to Applications > General Settings and click Edit.

  4. Enter a value for App integration name such as “Tango OIDC”.

  5. Select Login initiated by > Either Okta or App.

  6. Select Application visibility >Display application icon to users.

    image-20250129-213630.png 

  7. For Initiate login URI, copy and paste the same link you have found under “Service provider URL” in Tango portal.
    To copy the Service provider URL:

    1. Go to Tango > Team settings > Authentication.

    2. Click ellipsesellipses.pngmenu next to the newly added SSO.

    3. Copy the Service provider URL
      See full instructions in Add SSO connection in Tango portal

      image-20240924-233834.png 

  8. Click Save. 
  9. Click Edit next to Federation Broker Mode and Disable it.

    image-20241024-014505.png 

  10. Click Save. 

  11. Click Edit Logo and upload Tango logo measuring 420 x 120 pixels.

  12. Click Save.
    Refresh your Okta dashboard under My Apps and see the newly created “Tango” tile. To test, click the tile to log you in to the Tango portal.


 

Add a tile in Okta for SAML SSO connection

You can add a tile for the newly created Tango SSO connection on your Okta dashboard. To start, make sure you have the administrator rights and have enabled SSO in Tango portal. Log in to your Okta IdP and follow the instructions below:

To add Tango SSO tile:

  1. Log in to Okta using your admin account.

  2. Click okta-apps.png  Okta apps > My end user dashboard on top of the page.

  3. Inside the dashboard, click Add apps on the left menu.

  4. Type and search for “Tango” in the Search box. Tango cannot be found but in the search screen that appears, click Add a bookmark instead.

  5. For App URL, copy the Service provider URL and click Save. To copy the Service provider URL:

    1. Go to Tango > Team settings > Authentication.

    2. Click ellipses ellipses.png menu next to your newly added SSO.

    3. Copy Service provider URL. See full instructions in Add SSO connection in Tango portal.

  1. Enter an App name such as “Tango portal”.

  2. Click Save.
    Refresh your Okta dashboard under My Apps and see the newly created “Tango portal” tile. To test, click the tile to log you in to Tango portal.

 

More resources

 
TitleSSO configuration steps in Okta IdP
URL NameSSO-configuration-steps-in-Okta-IdP

Powered by