Manage enterprise connections
Auth and access
If you use Okta to centralize authentication and authorization in your business, you can integrate Kinde as a service provider for these processes. This gives you the benefits of Kinde’s robust auth capabilities, while keeping the familiar Okta structure.
You need to set up an enterprise connection in Kinde for this, and add an Okta application. See steps below.
Depending on your SAML set up, you may need to include advanced configurations for your connection. See Advanced SAML configurations.
Enter a name for the connection.
Enter a random value for the Entity ID, e.g. 870sa9fbasfasdas23aghkhc12zasfnasd
.
Enter the IdP metadata URL. This URL comes from your identity provider.
Enter a sign in URL if your IdP requires a specific URL.
If you want, select the Sign request algorithm and Protocol binding. The options you choose will depend on what your identity provider prefers or requires.
Select a Name ID format. This helps identify and link user identities between your IdP and Kinde.
Enter an Email key attribute. This is the attribute in the SAML token that contains the user’s email. Setting this value ensures that the email address returned in the SAML response is correctly retrieved. We do not recommend leaving this field blank, but if you do we will set ‘email’ as the attribute.
(Optional) Add a first name and last name key attribute.
Enter any relevant Home realm domains. This is how SAML recognizes a user’s credentials and routes them to the correct sign in page. Note that home realm domains need to be unique across all connections in an environment. Read more about home realm domains.
If you use home realm domains, the sign in button is hidden on the auth screen by default. To show the SSO button, select the Always show sign-in button option.
Copy the reply relevant URL:
If you want to enable just-in-time (JIT) provisioning for users, select the Create a user record in Kinde option. This saves time adding users manually or via API later.
(Temporary feature) Select if you want to treat this connection as a trusted provider. A trusted provider is one that guarantees the email they issue is verified.
(Optional) In the Sign SAML request section, paste in the Signed certificate and Private key. You may have got these from your IdP or you may have generated yourself (see procedure above).
Enter any upstream params that you want to pass to the identity provider. Not all providers support this, so check their documentation first.
Select Save.
Sign in to the Okta admin console.
Select Applications > Applications.
Select Create App Integration. The Sign-in method options opens.
Select SAML 2.0 and then select Next. The app’s general settings opens.
Add a name in the App name field then select Next. The Configure SAML screen opens.
In the SAML settings section, enter the following values:
In the next screen, select I’m a software vendor. I’d like to integrate my app with Okta, then select Finish. You will be redirected to the newly created application in Okta.
Select the Sign on tab and copy the metadata URL.