orchestrator
2024.10
true
- Getting started
- Best practices
- Tenant
- About the Tenant Context
- Searching for Resources in a Tenant
- Managing Robots
- Connecting Robots to Orchestrator
- Storing Robot Credentials in CyberArk
- Storing Unattended Robot Passwords in Azure Key Vault (read only)
- Storing Unattended Robot Credentials in HashiCorp Vault (read only)
- Storing Unattended Robot Credentials in AWS Secrets Manager (read only)
- Deleting Disconnected and Unresponsive Unattended Sessions
- Robot Authentication
- Robot Authentication With Client Credentials
- SmartCard Authentication
- Configuring automation capabilities
- Audit
- Settings - Tenant Level
- Resource Catalog Service
- Folders Context
- Automations
- Processes
- Jobs
- Triggers
- Logs
- Monitoring
- Queues
- Assets
- Storage Buckets
- Orchestrator testing
- Other Configurations
- Integrations
- Host administration
- Organization administration
- Troubleshooting

Orchestrator user guide
Last updated Sep 10, 2025
Okta Authentication
linkConfigure Okta to Recognize a New Orchestrator Instance
linkNote: The following steps are valid for Okta SAML setup. Please note that the following procedure is a broad description of a sample configuration. For a fully detailed how-to, visit the official Okta documentation.
- Log in to Okta. The following setup is made in Classic UI view. You can change it from the drop-down on the top-right corner of the window.
- On the Application tab, select Create New App. The Create a New Application Integration window is displayed.
- Choose SAML 2.0 as sign-on method and select Create.
- For the new integration, on the General Settings window, enter the application name.
- On the SAML Settings window, fill in the General section as per this example:
- Single sign on URL: The Orchestrator instance URL +
/identity/Saml2/Acs
. For example,https://orchestratorURL/identity/Saml2/Acs
. - Enable the Use this for Recipient URL and Destination URL check box.
- Audience URI:
https://orchestratorURL/identity
- Name ID Format: EmailAddress
-
Application Username: Email
Note: Whenever filling in the URL of the Orchestrator instance, make sure it does not contain a trailing slash. Always fill it in ashttps://orchestratorURL/identity
, nothttps://orchestratorURL/identity/
.
- Single sign on URL: The Orchestrator instance URL +
- Select Show Advanced Settings and fill in the Attribute Statements section:
-
Set the Name field to
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress
and select user.email from the Value drop-down.
-
- Download the Okta certificate.
- In the Feedback section, select the option that suits you and select Finish.
- On the Sign On tab, in the Settings section, select Setup Instructions. You are redirected to a new page containing the instructions required to complete your Orchestrator configuration for SAML
2.0: Identity Provider Sign-On URL, Identity Provider Issuer, X.509 Certificate.Note: If, for any reason, the information about the identity provider is lost, you can, at any point, visit Sign On > Settings > View Setup Instructions.
Assigning People to the Application
linkIn order for a user to be able to use OKTA authentication, he must be assigned the newly created application:
- Log in to OKTA.
- On the Application page, select the newly created application.
- On the Assignments tab, select Assign > Assign to People and then select the users to be given the necessary permissions.
- The newly added users are displayed on the People tab.
Set Orchestrator/Identity Server to Use Okta Authentication
link- Define a user in Orchestrator and have a valid email address set on the Users page.
- Import the signing certificate:
- For Windows deployments, import the signing certificate provided by the Identity Provider to the Windows certificate store using Microsoft Management Console.
- For Azure deployments, upload the certificate provided by the Identity Provider from in the Azure portal. (TLS/SSL settings > Public Certificates (.cer) > Upload Public Key Certificate). Refer to Frequently Encountered Orchestrator Errors to adjust your web app configuration if you are unable to use OKTA authentication and encounter the following error message:
An error occurred while loading the external identity provider. Please check the external identity provider configuration.
- Log in to the Management portal as a system administrator.
- Go to Security.
- Select Configure under SAML SSO:
The SAML SSO configuration page opens.
- Set it up as follows:
- Optionally select the Force automatic login using this provider checkbox if, after the integration is enabled, you want your users to only sign in through the SAML integration.
- Set the Service Provider Entity ID parameter to
https://orchestratorURL/identity
. - Set the Identity Provider Entity ID parameter to the value obtained by configuring Okta authentication (refer to step 9).
- Set the Single Sign-On Service URL parameter to the value obtained by configuring Okta authentication (refer to step 9).
- Select the Allow unsolicited authentication response checkbox.
- Set the Return URL parameter to
https://orchestratorURL/identity/externalidentity/saml2redirectcallback
. Make sure to add/identity/externalidentity/saml2redirectcallback
at the end of the URL for the Return URL parameter. This path is specific to Okta as it allows you to reach an Orchestrator environment directly from Okta. - Set the SAML binding type parameter to
HTTP redirect
. - In the Signing Certificate section, from the Store name list, select My.
- From the Store location list, select
LocalMachine
for Windows deployments orCurrentUser
for Azure Web App deployments. -
In the Thumbprint field, add the thumbprint value provided in the Windows certificate store. Details.
Note:Replace all occurrences ofhttps://orchestratorURL
with the URL of your Orchestrator instance.Make sure that the URL of the Orchestrator instance does not contain a trailing slash. Always fill it in ashttps://orchestratorURL/identity
, nothttps://orchestratorURL/identity/
.
- Select Save to save the changes to the external identity provider settings.
The page closes and you return to the Security Settings page.
- Select the toggle to the left of SAML SSO to enable the integration.
- Restart the IIS server.