Skip to main content

Configure Okta SAML SSO & SCIM for Guidde

Set up secure access to Guidde with Okta SAML SSO and automated user management via SCIM.

Updated this week

Configure Okta SAML SSO

Note: This article includes BoxyHQ’s official SSO setup for reference.

Your CSM will share the relevant step-by-step instructions and links, which will be available to you during the setup process.

Step 1: Create Application

  1. In your Okta account, click Applications from the left navigation menu.

  • If the application already exists, click it in the list and proceed to the next step.

  • If you haven't created a SAML application yet, click the Create App Integration button to set up a new application.

    img alt

2. On the next screen, Choose SAML 2.0, and click Next. Guidde also supports OIDC - OpenID Connect.

img alt

3. Give your application a name and click Next. For Example: Guidde.

img alt

4. Click Next.

Step 2: Configure Application

On the next screen, enter the following values from Guidde’s setup link into the SAML Settings section:

  1. Single sign on URL: Click the copy icon at the top right of this input field to quickly grab and paste your SSO URL from Boxy setup link to Okta.

  2. Audience URI: (SP Entity ID)

  3. Name ID Format: Email Address

img alt

Step 3: Attribute Mapping

1. Under the Attribute Statements section in Okta, you need to configure the following attributes: Guidde has four attributes:

  • ID

  • Email

  • First Name

  • Last Name

2. You can add more by clicking “Add another” at the bottom of this section.

These attributes will be sent via SSO for each user.

img alt

3. On the next screen select “I'm an Okta customer” adding an internal app.

4. Click Finish.

img alt

5. From your Okta application, click the ”Sign On” tab

6. Scroll down to find the section SAML Signing Certificates.

7. On the SHA-2 row, click Actions: And select View Metadata from the menu.

img alt

8. A separate window will open with the metadata XML file.You can copy the entire file, or just the URL link to your clipboard.

Step 4: Create SAML Connection

1. In the Boxy setup flow, enter the Identity Provider Metadata in the designated input field. You can either enter the metadata URL or paste the XML file content directly.

2. Click Save.

That’s it! Now Guidde is interacting with Okta and you can easily manage it with SSO.

Configure Okta SCIM

SCIM enables automatic user management between your identity provider (IdP) and Guidde, ensuring user accounts and roles stay in sync and up to date. It reduces manual work, improves security, and makes sure the right people always have the right level of access - saving admins manual user-management and keeping your workspace organized and secure.

Configure Your SCIM Integration

To configure your SCIM integration, you’ll receive your SCIM endpoint and SCIM secret credentials in two separate emails from your CSM.

1. From your Okta account, navigate to Applications.

2. Under active applications you’ll find Guidde - click into it.

3. Under the General tab, provisioning settings will be set to None by default.

4. Click Edit (at the upper right of this section).

5. Toggle the SCIM option in the settings.

6. Scroll down and click Save at the bottom.

7. A new tab called Provisioning will now appear in the upper toolbar.

8. It will be empty at first. Click Edit in the upper-right corner to configure it.

9. Paste the SCIM endpoint URL (received from your CSM)

10. The Unique Identifier field determines how users are uniquely identified. Guidde uses email as the unique identifier. The authentication should be: HTTP Header

11. Under HTTP Header authorization - Paste the SCIM Secret received from your CSM.

12. Select the following three categories for provisioning support

(all must be selected):

  • Import New Users and Profile Updates

  • Push New Users

  • Push Profile Updates

13. Click “Test Connector Configuration” at the bottom right.

14. A popup will confirm the connector configuration.

15. At the end of the test, and once your SCIM is set up, you’ll land on this page, where you can assign attributes to users in your organization.

Add User Attributes

1. Guidde offers two provisioning categories:

  • Business role (within your org. Such as Operations, IT, Sales, etc)

  • User role in Guidde (viewer, content manager, admin)

2. Click the Provisioning tab.

3. Scroll down to “Guidde Attribute Mapping

4. Click “Go to Profile Editor

5. Click “Add Attribute

6. In the opened window fill in:

  • Display Name: Business Role

  • Variable Name: businessRole

  • External namespace: urn:ietf:params:scim:schemas:core:2.0:User

7. Click on “Enum”.

8. Add attributes that are relevant to the business roles in your organization:

  • Marketing

  • Support

  • Human Resources

  • Sales

  • Customer Success

  • Operations

  • Learning and development

  • Product Management

  • IT

  • Other

9. Scroll down and click “Save and Add Another”. The second Attribute will be User Role

10. In the opened window fill in:

  • Display Name: User Role

  • Variable Name: userRole

  • External Namespace: urn:ietf:params:scim:schemas:core:2.0:User

11. Click “Enum” and enter the values:

  • Viewer

  • Creator

  • ContentManager

  • Admin

Important: The value needs to be inserted as is. The display name can be changed.

12. Scroll down and click Save.

Assign Users with Attributes

1. Navigate to the Assignments tab.

2. Click on Assign - and Assign to people.

3. Select the users from the opened list by clicking “Assign”.

4. In the opened window:

Scroll down and fill in the Business role and User role in the designated area:

5. Click Save and go back.

That’s it!

Now, when you assign a user, you can set their Business Role and User Role, their information will sync automatically with these properties.

Did this answer your question?