
SailPoint ISC + Okta SSO Integration with JIT
Date Posted:
9 Jun 2025
Category:
Security

SailPoint ISC + Okta SSO Integration with JIT
Date Posted:
9 Jun 2025
Category:
Security

SailPoint ISC + Okta SSO Integration with JIT
Date Posted:
9 Jun 2025
Category:
Security
SailPoint ISC + Okta SSO Integration with JIT Provisioning: A Step-by-Step Guide
Introduction of Sailpoint ISC + Okta SSO Integration with JIT
This guide outlines how to configure SailPoint Identity Security Cloud (ISC) as a Service Provider (SP) and Okta as an Identity Provider (IdP) using SAML. It also covers enabling Just-In-Time (JIT) provisioning to automatically create user identities in SailPoint when they first log in through Okta.
Step 1: Create SAML Application in Okta
Navigate to Admin > Applications > Create App Integration
Choose SAML as the sign-on method
Enter App Name and upload logo (optional), then click Next

Step 2: SAML Configuration in Okta
Single Sign-On URL: Paste SAML URL from SailPoint ISC
Audience URI (SP Entity ID): Paste Entity ID from SailPoint ISC.

Define Name ID format if required
Set Application Username using standard or custom expression (e.g., user.middleName + '.' + user.middleName)
Click Next, then Finish.
Step 3: Get Identity Provider Details from Okta
Go to the app’s Sign-On tab
Click View SAML setup instructions
Copy the following:
Identity Provider Single Sign-On URL
Identity Provider Issuer
X.509 Certificate (Download it).
Step 4: Configure SailPoint as Service Provider
Go to Admin > Global > Security Settings > Service Provider in SailPoint
Under Identity Provider Settings:
Paste Issuer into Entity ID
Paste SSO URL into both Login URL (POST) and Login URL (Redirect)
Use Okta’s sign-in URL for Logout URL.

Import the X.509 Certificate.

Click Save
Step 5: Assign App to Users in Okta
Go to Admin > Applications > [SailPoint App] > Assignments
Click Assign > Assign to People or Assign to Groups
Users can now launch the SailPoint app from the Okta dashboard.
Step 6: User Login Behavior
If identity exists in SailPoint, user is logged in via SAML SSO
If accessing SailPoint directly (e.g., https://dev-03439048-admin.okta.com/), user is redirected to Okta login
Bypass URL for admins and optionally users: https://<your-isc-domain>/login/login/?brand=default&prompt=true
Enable remote identity provider after saving settings

Step 6.1: Test SSO Integration
Log in as an assigned user through the Okta dashboard
Click the SailPoint app icon from the end user dashboard to initiate the SAML SSO flow
Verify that you are automatically redirected and logged into SailPoint ISC without entering credentials
Test logout redirection to ensure the session ends and redirects to the Okta login page.
Step 7: Create JIT Source in SailPoint
Go to Admin > Connections > Sources > Create New
Choose SAML Just-in-Time Provisioning > Configure
Enter name, description, and source owner
In Account Schema, add:
id, firstName, lastName, email, phone, manager.

Step 8: Create Identity Profile for JIT Source
Navigate to Admin > Identity Management > Identity Profiles > Create New
Enter name and select the JIT source
After creation, view profile under Connections tab of the JIT source.

Step 9: Map Attributes from Okta to SailPoint
Ensure attribute names match exactly between Okta and SailPoint
In SailPoint Service Provider Settings, enter Okta attribute names.

Step 10: Add Attribute Statements in Okta
Go to Admin > Applications > [SailPoint App] > General > SAML Settings > Edit
Under Attribute Statements, add required fields:
firstName, lastName, email, etc.

Click Next, then Finish.
Step 11: Test JIT Provisioning
In Okta: Admin > Directory > People > Add Person
Fill details and click Save
Assign SailPoint app to this new user
Log in to Okta with the new user account
Launch SailPoint app from user dashboard
If identity doesn’t exist, SailPoint will automatically create identity using JIT and log user in.
Conclusion
This configuration enables secure, seamless access to SailPoint ISC using Okta SAML SSO, with JIT provisioning for new users. It simplifies identity management, reduces manual onboarding, and improves user experience.
Stay tuned to our blog to see more posts about
Sailpoint products implementation and its related updates.
Stay tuned to our blog to see more posts about
Sailpoint products implementation and its related updates.
Category:
Security
Stay tuned to our blog to see more posts about
Sailpoint products implementation and its related updates.
Stay tuned to our blog to see more posts about
Sailpoint products implementation and its related updates.
Category:
Category:
Security
Security
Get your
Tailored Quote for your
Organisation
Get your
Tailored Quote for your
Organisation
SailPoint ISC + Okta SSO Integration with JIT Provisioning: A Step-by-Step Guide
Introduction of Sailpoint ISC + Okta SSO Integration with JIT
This guide outlines how to configure SailPoint Identity Security Cloud (ISC) as a Service Provider (SP) and Okta as an Identity Provider (IdP) using SAML. It also covers enabling Just-In-Time (JIT) provisioning to automatically create user identities in SailPoint when they first log in through Okta.
Step 1: Create SAML Application in Okta
Navigate to Admin > Applications > Create App Integration
Choose SAML as the sign-on method
Enter App Name and upload logo (optional), then click Next

Step 2: SAML Configuration in Okta
Single Sign-On URL: Paste SAML URL from SailPoint ISC
Audience URI (SP Entity ID): Paste Entity ID from SailPoint ISC.

Define Name ID format if required
Set Application Username using standard or custom expression (e.g., user.middleName + '.' + user.middleName)
Click Next, then Finish.
Step 3: Get Identity Provider Details from Okta
Go to the app’s Sign-On tab
Click View SAML setup instructions
Copy the following:
Identity Provider Single Sign-On URL
Identity Provider Issuer
X.509 Certificate (Download it).
Step 4: Configure SailPoint as Service Provider
Go to Admin > Global > Security Settings > Service Provider in SailPoint
Under Identity Provider Settings:
Paste Issuer into Entity ID
Paste SSO URL into both Login URL (POST) and Login URL (Redirect)
Use Okta’s sign-in URL for Logout URL.

Import the X.509 Certificate.

Click Save
Step 5: Assign App to Users in Okta
Go to Admin > Applications > [SailPoint App] > Assignments
Click Assign > Assign to People or Assign to Groups
Users can now launch the SailPoint app from the Okta dashboard.
Step 6: User Login Behavior
If identity exists in SailPoint, user is logged in via SAML SSO
If accessing SailPoint directly (e.g., https://dev-03439048-admin.okta.com/), user is redirected to Okta login
Bypass URL for admins and optionally users: https://<your-isc-domain>/login/login/?brand=default&prompt=true
Enable remote identity provider after saving settings

Step 6.1: Test SSO Integration
Log in as an assigned user through the Okta dashboard
Click the SailPoint app icon from the end user dashboard to initiate the SAML SSO flow
Verify that you are automatically redirected and logged into SailPoint ISC without entering credentials
Test logout redirection to ensure the session ends and redirects to the Okta login page.
Step 7: Create JIT Source in SailPoint
Go to Admin > Connections > Sources > Create New
Choose SAML Just-in-Time Provisioning > Configure
Enter name, description, and source owner
In Account Schema, add:
id, firstName, lastName, email, phone, manager.

Step 8: Create Identity Profile for JIT Source
Navigate to Admin > Identity Management > Identity Profiles > Create New
Enter name and select the JIT source
After creation, view profile under Connections tab of the JIT source.

Step 9: Map Attributes from Okta to SailPoint
Ensure attribute names match exactly between Okta and SailPoint
In SailPoint Service Provider Settings, enter Okta attribute names.

Step 10: Add Attribute Statements in Okta
Go to Admin > Applications > [SailPoint App] > General > SAML Settings > Edit
Under Attribute Statements, add required fields:
firstName, lastName, email, etc.

Click Next, then Finish.
Step 11: Test JIT Provisioning
In Okta: Admin > Directory > People > Add Person
Fill details and click Save
Assign SailPoint app to this new user
Log in to Okta with the new user account
Launch SailPoint app from user dashboard
If identity doesn’t exist, SailPoint will automatically create identity using JIT and log user in.
Conclusion
This configuration enables secure, seamless access to SailPoint ISC using Okta SAML SSO, with JIT provisioning for new users. It simplifies identity management, reduces manual onboarding, and improves user experience.