Configure Okta SAML SSO
Note: This article includes BoxyHQ’s official SSO setup for reference.
Your CSM will share the relevant step-by-step instructions and links, which will be available to you during the setup process.
Step 1: Create Application
In your Okta account, click Applications from the left navigation menu.
If you haven't created a SAML application yet, click the Create App Integration button to set up a new application.
2. On the next screen, Choose SAML 2.0, and click Next. Guidde also supports OIDC - OpenID Connect.
3. Give your application a name and click Next. For Example: Guidde.
4. Click Next.
Step 2: Configure Application
On the next screen, enter the following values from Guidde’s setup link into the SAML Settings section:
Single sign on URL: Click the copy icon at the top right of this input field to quickly grab and paste your SSO URL from Boxy setup link to Okta.
Audience URI: (SP Entity ID)
Name ID Format: Email Address
Step 3: Attribute Mapping
1. Under the Attribute Statements section in Okta, you need to configure the following attributes: Guidde has four attributes:
ID
Email
First Name
Last Name
2. You can add more by clicking “Add another” at the bottom of this section.
These attributes will be sent via SSO for each user.
3. On the next screen select “I'm an Okta customer” adding an internal app.
4. Click Finish.
5. From your Okta application, click the ”Sign On” tab
6. Scroll down to find the section SAML Signing Certificates.
7. On the SHA-2 row, click Actions: And select View Metadata from the menu.
8. A separate window will open with the metadata XML file.You can copy the entire file, or just the URL link to your clipboard.
Step 4: Create SAML Connection
1. In the Boxy setup flow, enter the Identity Provider Metadata in the designated input field. You can either enter the metadata URL or paste the XML file content directly.
2. Click Save.
That’s it! Now Guidde is interacting with Okta and you can easily manage it with SSO.
Configure Okta SCIM
SCIM enables automatic user management between your identity provider (IdP) and Guidde, ensuring user accounts and roles stay in sync and up to date. It reduces manual work, improves security, and makes sure the right people always have the right level of access - saving admins manual user-management and keeping your workspace organized and secure.
Configure Your SCIM Integration
To configure your SCIM integration, you’ll receive your SCIM endpoint and SCIM secret credentials in two separate emails from your CSM.
1. From your Okta account, navigate to Applications.
2. Under active applications you’ll find Guidde - click into it.
3. Under the General tab, provisioning settings will be set to None by default.
4. Click Edit (at the upper right of this section).
5. Toggle the SCIM option in the settings.
6. Scroll down and click Save at the bottom.
7. A new tab called Provisioning will now appear in the upper toolbar.
8. It will be empty at first. Click Edit in the upper-right corner to configure it.
9. Paste the SCIM endpoint URL (received from your CSM)
10. The Unique Identifier field determines how users are uniquely identified. Guidde uses email as the unique identifier. The authentication should be: HTTP Header
11. Under HTTP Header authorization - Paste the SCIM Secret received from your CSM.
12. Select the following three categories for provisioning support
(all must be selected):
Import New Users and Profile Updates
Push New Users
Push Profile Updates
13. Click “Test Connector Configuration” at the bottom right.
14. A popup will confirm the connector configuration.
15. At the end of the test, and once your SCIM is set up, you’ll land on this page, where you can assign attributes to users in your organization.
Add User Attributes
1. Guidde offers two provisioning categories:
Business role (within your org. Such as Operations, IT, Sales, etc)
User role in Guidde (viewer, content manager, admin)
2. Click the Provisioning tab.
3. Scroll down to “Guidde Attribute Mapping”
4. Click “Go to Profile Editor”
5. Click “Add Attribute”
6. In the opened window fill in:
Display Name: Business Role
Variable Name: businessRole
External namespace: urn:ietf:params:scim:schemas:core:2.0:User
7. Click on “Enum”.
8. Add attributes that are relevant to the business roles in your organization:
Marketing
Support
Human Resources
Sales
Customer Success
Operations
Learning and development
Product Management
IT
Other
9. Scroll down and click “Save and Add Another”. The second Attribute will be User Role
10. In the opened window fill in:
Display Name: User Role
Variable Name: userRole
External Namespace: urn:ietf:params:scim:schemas:core:2.0:User
11. Click “Enum” and enter the values:
Viewer
Creator
ContentManager
Admin
Important: The value needs to be inserted as is. The display name can be changed.
12. Scroll down and click Save.
Assign Users with Attributes
1. Navigate to the Assignments tab.
2. Click on Assign - and Assign to people.
3. Select the users from the opened list by clicking “Assign”.
4. In the opened window:
Scroll down and fill in the Business role and User role in the designated area:
5. Click Save and go back.
That’s it!
Now, when you assign a user, you can set their Business Role and User Role, their information will sync automatically with these properties.
