LogoLogo
  • What is LIBSAFE Go
  • LIBSAFE Go Benefits
  • CONCEPTS
    • Overview
    • Organize your content
    • Platform architecture
    • OAIS and ISO 16363
      • Understanding OAIS and ISO 16363
      • LIBSAFE Go support for OAIS Conformance
      • Planning for preservation
      • ISO 16363 certification guide
  • GET STARTED
    • Create a data container
    • Upload content
    • Download content
    • Introduction to metadata
    • Search
    • File versioning and recovery
    • Work with data containers
    • Functions
    • Storage mode transitions
    • Jupyter Notebooks
    • OpenAccess Integration
      • Transfer Connector
      • LIBSAFE Go Configuration
      • OpenAccess Configuration
      • Multilanguage
      • Supported Formats
      • Changelog
  • CONFIGURATION
    • Archive organization
    • Container templates
    • Configure metadata
    • Users and Permissions
  • DEVELOPER'S GUIDE
    • Functions
    • Using the API
    • Functions gallery
  • COOKBOOK
    • AWS CLI with LIBSAFE Go
    • Using S3 Browser
    • Using FileZilla Pro
    • Getting your S3 bucket name
    • Getting your S3 storage credentials
    • Advanced API File Search
    • Tips for faster uploads
    • Configuring Azure SAML-based authentication
    • Configuring Okta authentication
    • Create a manifest before transferring files
  • FILE BROWSER
    • Supported formats for preview
    • Known issues and limitations
  • Changelog and Release Notes
Powered by GitBook
On this page

Was this helpful?

  1. COOKBOOK

Configuring Okta authentication

PreviousConfiguring Azure SAML-based authenticationNextCreate a manifest before transferring files

Last updated 2 years ago

Was this helpful?

In order to configure Okta with our services, your institution must create a new SAML 2.0 application with the following details:

  • Single sign-on URL:

  • Audience URI (SP Entity ID):

  • Default RelayState: [leave blank]

  • Name ID format: Persistent

  • Application username: Okta username or Email (the value MUST be unique for each user)

After this is done, please forward us the IDP Metadata to complete the integration. To obtain the metadata, follow these steps:

https://access.libnova.com/Shibboleth.sso/SAML2/POST
https://access.libnova.com/shibboleth
Step 1
Step 2
Step 3 - fill in with the above information
Step 4
Step 5
Step 6 - Copy the IDP metadata to a text file and save it with a .xml extension.