SAML SSO gives users a centralized and secure way of controlling access to their organizations. When you join an organization that uses SAML SSO, you sign in through the organization's IdP and your existing Survicate account is linked to an external identity that belongs to the organization.

Getting started

Before you start you need to make sure you are the owner of your organization. Please go to Settings > 🔑SAML Authentication and click Enable SAML authentication toggle. Leave the tab open, as you'll need the data from here.

Okta: Identity Provider (IdP) setup

Once you have Okta account created, add a new app:

Then in  SAML Settings, you will be asked to provide Single sign on URL and Audience URI

You can find Single sign on URL under ACS (Consumer) URL in Survicate:

While Audience URI is the same URL, but it has a different ending: /metadata instead of /acs.
So if your Single sign on URL or ACS (Consumer) URL is:

https://panel-api.survicate.com/settings/saml/1234/acs

Your Audience URI will be:

https://panel-api.survicate.com/settings/saml/1234/metadata

On the bottom of the screen click Next and then Finish. Go to Sign on page and View setup instructions

Then go to the SSO page. You'll need Single Sign-On URL, Provider Issuer and X.509 Certificate:

Survicate setup

In Survicate SAML Authentication tab paste the Provider Issuer to Issuer field, Single Sign-On URL to Sign on URL and X.509 Certificate to Public certificate.

Once you click "Save" you will get a list of recovery codes. Please save them; you will need those to bypass the Single Sign-On when you don't have access to SAML provider anymore. 

Did this answer your question?