StatusGator Support

Configuring Okta SSO

Open navigation

Configuring Okta SSO

StatusGator supports enterprise Single Sign On (SSO) using the Security Assertion Markup Language (SSO). SAML is an open standard for exchanging authentication and authorization data between parties. SAML requires an identity provider (in this case, Okta) and a service provider, in this case StatusGator.

StatusGator SAML SSO has the following benefits:

• Users have have a single identity managed by your SAML Identity Provider.

• One click access to StatusGator from your Identity Provider dashboard.


As an admin in your Okta account, create a new application. This can be done by clicking the Applications area in their main navigation.

1. Click the Create App integration button.

2. Click the SAML 2.0 radio button.

3. Name your application (f.e StatusGator SSO), and optionally add app logo and hit Next.

You can use this logo:

4. On the SAML settings page, configure these values:

Single sign on URL:

Note: Make sure Use this for Recipient URL and Destination URL is checked.

Audience URI (SP Entity ID):

Name ID format: EmailAddress

Application username: Email

Update application username on: Create and update

5. Scroll down and configure Attribute Statements which map values to user attributes in StatusGator. You'll want to enter first_name, last_name and email as the attribute name on the left, and then choose the corresponding user values on the right. Here's a full screenshot of what the settings should look like:

6. Ensure email is set. StatusGator SAML SSO does not use the standard NameID in the SSO negotiation. Email is required for StatusGator SSO to function.

8. Double check to ensure the Attribute Statements as well as Single sign on URL and Audience URI are set. Then click Next.

7. On the next page click Finish 

8. This completes the setup of your ad-hoc StatusGator application in Okta. Next you will retrieve the settings needed to configure StatusGator to use Okta. Open metadata details needed to configure StatusGator for your new Okta application. Keep this browser window open. This information will be used next when configuring StatusGator.

9. Now, go back to StatusGator account, open Team members page, click on the Authentication tab and enable SSO option. Now use the data from the Okta account to fill out the form below.

  • Identity Provider Entity ID – Issuer in Okta
  • Sign On URL – Sign on URL in Okta
  • Sign Out URL – Sign out URL in Okta
  • IDP Certificate – Download the Signing Cerfificate encoded certificate. To extract the code, you can drag the file into your browser tab and then copy the code.

The fingerprint and algorithm fields can be left blank. 

Once setup, you'll need to associate users in your Okta Directory with StatusGator so they may log in.

If you have any questions or problems, please email us or submit a ticket.

Did you find it helpful? Yes No

Send feedback
Sorry we couldn't be helpful. Help us improve this article with your feedback.