Configure SSO with Okta and SAML2
In this video, we integrate Okta with Redocly to set up Single Sign-On (SSO) using SAML2.
This step-by-step tutorial shows you how to create an identity provider in Redocly, configure an Okta application, assign user groups, and test the connection.
It also covers using group attributes for customized access controls, giving you complete flexibility in managing team permissions. Follow along and simplify your Redocly access with Okta!
Preserve the Owner organization role
Critical step: Complete this step before clicking Save in Reunite to prevent getting locked out of your organization.
To prevent Okta from changing users' roles to the default organization role specified in the SSO settings:
- In Okta, navigate to Directory > Groups.
- Create a group named
redocly.owners
. - Navigate to Directory > People and assign users with an Owner role in your organization to the
redocly.owners
group. - Return to Reunite and click Save to complete the identity provider setup.
Configure SSO in Redocly Reunite
- Log into your Redocly Reunite account.
- Navigate to Organization settings > SSO.
- Click Create identity provider.
- Select SAML 2.0 as the SSO method.
- Choose Corporate SSO account to enable SSO for both Reunite and internal projects.
- Keep this page open - you'll need to copy values from here to Okta and then return to complete the setup.
Create SAML application in Okta
- In your Okta dashboard, navigate to Applications.
- Click Create App Integration.
- Select SAML 2.0 as the sign-in method.
- Click Next.
- Fill out the general settings:
- App name: Enter a descriptive name like "Redocly Reunite"
- App logo: Upload your company logo (optional)
- Copy the Single sign-on URL and Audience URI from your Reunite SSO page and paste them into the corresponding fields in Okta.
Configure group attribute statements
Group attributes enable role-based access control (RBAC) by passing Okta group memberships to Redocly.
- In the Attribute Statements section of your Okta SAML app:
- Name: Enter
redocly.com/sso/teams
- Name format: Select URI Reference
- Value: Enter
getFilteredGroups(group.name, "redocly.", 40)
- Name: Enter
- This filter passes all groups that start with "redocly." to Redocly.
- Click Next.
- Select This is an internal app that we have created.
- Click Finish.
Get SAML setup information
- In your newly created Okta app, click View SAML setup instructions.
- Copy the following information - you'll need it to complete the Reunite setup:
- Identity Provider Single Sign-On URL
- Identity Provider Issuer
- X.509 Certificate
Complete SSO setup in Reunite
- Return to your Reunite SSO configuration page.
- Fill out the remaining fields with information from Okta:
- Single sign-on URL: Paste the URL from Okta
- Issuer ID: Paste the issuer URL from Okta
- X.509 Certificate: Paste the certificate from Okta
- Set the Default organization role to Owner initially to ensure you don't lose administrative access.
- Click Save to create the identity provider.
Create and assign Okta groups
- In Okta, navigate to Directory > Groups.
- Create groups using the naming pattern that starts with "redocly.":
redocly.owners
(for organization owners)redocly.members
(for organization members)- Add any project-specific groups as needed
- Navigate to Directory > People.
- Assign users to the appropriate groups.
- Return to your SAML application in Okta.
- Go to the Assignments tab.
- Click Assign > Assign to Groups.
- Assign your newly created groups to the application.
Test SSO login
- Log out of Reunite.
- Navigate to your organization's SSO login URL:
https://app.redocly.com/org/YOUR_ORG_SLUG
- Click Login with SSO.
- Complete the Okta authentication flow.
- If you're using the same email address as your existing Redocly account, you'll be prompted to link accounts.
- Verify you can access all expected features and that your organization role is preserved.
Update default organization role
After confirming SSO works correctly, you can adjust the default role for new users:
- In Reunite, navigate to Organization settings > SSO.
- Edit your identity provider.
- Change the Default organization role to Member or Viewer based on your security requirements.
- Save the changes.
- Test by logging out and back in to ensure you retain access.
Test project SSO and RBAC
To test project-level access control using Okta groups:
In your project's
redocly.yaml
file, configure SSO and RBAC:sso: type: corporate rbac: content: "**": read tutorials: redocly.developers: read
This example allows everyone to read all content, but restricts tutorials to the
redocly.developers
group.Create the
redocly.developers
group in Okta.Assign users to the group.
Assign the group to your SAML application in Okta.
Test access by logging into your project - users should only see content they have permissions for.
Resources
Your SSO integration with Okta is now complete. Users can access Redocly using their corporate credentials, and you can manage permissions through Okta groups.
- See Single Sign-on for different IdP types and how they apply to projects.
- Add an identity provider in Reunite.
- Configure SSO to enable multiple IdP types for a project.
- Use Role-based access control (RBAC) to grant specific users access to specific content.