/
Group claims from Okta (SAML)

Group claims from Okta (SAML)

To send group claims from Okta, you should go into your app configurations and edit the SAML settings. The screenshot shows an example of such an app, called issues.example.com. You find the SAML settings under the general tab.

In the SAML settings you should locate GROUP ATTRIBUTE STATEMENTS (OPTIONAL), and here you can add statements with NAME "http://schemas.xmlsoap.org/claims/Group". 

Okta allows you to customize and filter which groups to include in the SAML messages, and you have the option to write STARTS_WITH, EQUALS and REGEX filters. The screenshot below shows you you can specify a regular expression that includes all group names containing "jira".



If you save these settings, Okta will include assertions like the following in SAML responses:

<saml2:AttributeValue xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:type="xs:string">jira-software-users</saml2:AttributeValue>

 

You may now configure Managed Groups in Kantega SSO.

Related content

Group claims from Entra ID / Azure (SAML)
Group claims from Entra ID / Azure (SAML)
More like this
Group claims from identity provider (legacy, pre-5.3)
Group claims from identity provider (legacy, pre-5.3)
More like this
Group claims from Identity Provider
Group claims from Identity Provider
More like this
Group claims from Keycloak (SAML)
Group claims from Keycloak (SAML)
More like this
Group claims from Entra ID / Azure (OIDC)
Group claims from Entra ID / Azure (OIDC)
More like this
Okta | SAML
More like this