- Getting started
- Best practices
- Tenant
- About the Tenant Context
- Searching for Resources in a Tenant
- Managing Robots
- Connecting Robots to Orchestrator
- Storing Robot Credentials in CyberArk
- Storing Unattended Robot Passwords in Azure Key Vault (read only)
- Storing Unattended Robot Credentials in HashiCorp Vault (read only)
- Storing Unattended Robot Credentials in AWS Secrets Manager (read only)
- Deleting Disconnected and Unresponsive Unattended Sessions
- Robot Authentication
- Robot Authentication With Client Credentials
- SmartCard Authentication
- Configuring automation capabilities
- Audit
- Settings - Tenant Level
- Resource Catalog Service
- Folders Context
- Automations
- Processes
- Jobs
- Triggers
- Logs
- Monitoring
- Queues
- Assets
- Storage Buckets
- Orchestrator testing
- Other Configurations
- Integrations
- Host administration
- About the host level
- Managing system administrators
- Managing tenants
- Configuring system email notifications
- Audit logs for the host portal
- Maintenance Mode
- Organization administration
- Troubleshooting

Orchestrator user guide
Okta Authentication
Configure Okta to Recognize a New Orchestrator Instance
The following steps are valid for Okta SAML setup. Please note that the following procedure is a broad description of a sample configuration. For a fully detailed how-to, visit the official Okta documentation.
-
Log in to Okta. The following setup is made in Classic UI view. You can change it from the drop-down on the top-right corner of the window.
Figure 1. Classic interface

-
On the Application tab, select Create New App. The Create a New Application Integration window is displayed.
-
Choose SAML 2.0 as sign-on method and select Create.
Figure 2. Create new application integration window

-
For the new integration, on the General Settings window, enter the application name.
-
On the SAML Settings window, fill in the General section as per this example:
- Single sign on URL: The Orchestrator instance URL +
/identity/Saml2/Acs. For example,https://orchestratorURL/identity/Saml2/Acs. - Enable the Use this for Recipient URL and Destination URL check box.
- Audience URI:
https://orchestratorURL/identity - Name ID Format: EmailAddress
- Application Username: Email
Note:
Whenever filling in the URL of the Orchestrator instance, make sure it does not contain a trailing slash. Always fill it in as
https://orchestratorURL/identity, nothttps://orchestratorURL/identity/.
- Single sign on URL: The Orchestrator instance URL +
-
Select Show Advanced Settings and fill in the Attribute Statements section:
-
Set the Name field to
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddressand select user.email from the Value drop-down.Figure 3. Attribute statements (optional) section

-
-
Download the Okta certificate.
-
In the Feedback section, select the option that suits you and select Finish.
-
On the Sign On tab, in the Settings section, select Setup Instructions. You are redirected to a new page containing the instructions required to complete your Orchestrator configuration for SAML 2.0: Identity Provider Sign-On URL, Identity Provider Issuer, X.509 Certificate.
Note:If, for any reason, the information about the identity provider is lost, you can, at any point, visit Sign On > Settings > View Setup Instructions.
Assigning People to the Application
In order for a user to be able to use OKTA authentication, he must be assigned the newly created application:
-
Log in to OKTA.
-
On the Application page, select the newly created application.
-
On the Assignments tab, select Assign > Assign to People and then select the users to be given the necessary permissions.
Figure 4. Assign Orchestrator25 to people window

-
The newly added users are displayed on the People tab.
Set Orchestrator/Identity Server to Use Okta Authentication
-
Define a user in Orchestrator and have a valid email address set on the Users page.
-
Import the signing certificate:
- For Windows deployments, import the signing certificate provided by the Identity Provider to the Windows certificate store using Microsoft Management Console.
- For Azure deployments, upload the certificate provided by the Identity Provider from in the Azure portal. (TLS/SSL settings > Public Certificates (.cer) > Upload Public Key Certificate). Refer to Frequently Encountered Orchestrator Errors to adjust your web app configuration if you are unable to use OKTA authentication and encounter the following error message:
An error occurred while loading the external identity provider. Please check the external identity provider configuration.
-
Log in to the Management portal as a system administrator.
-
Go to Security.
-
Select Configure under SAML SSO:
The SAML SSO configuration page opens.
-
Set it up as follows:
- Optionally select the Force automatic login using this provider checkbox if, after the integration is enabled, you want your users to only sign in through the SAML integration.
- Set the Service Provider Entity ID parameter to
https://orchestratorURL/identity. - Set the Identity Provider Entity ID parameter to the value obtained by configuring Okta authentication (refer to step 9).
- Set the Single Sign-On Service URL parameter to the value obtained by configuring Okta authentication (refer to step 9).
- Select the Allow unsolicited authentication response checkbox.
- Set the Return URL parameter to
https://orchestratorURL/identity/externalidentity/saml2redirectcallback. Make sure to add/identity/externalidentity/saml2redirectcallbackat the end of the URL for the Return URL parameter. This path is specific to Okta as it allows you to reach an Orchestrator environment directly from Okta. - Set the SAML binding type parameter to
HTTP redirect. - In the Signing Certificate section, from the Store name list, select My.
- From the Store location list, select
LocalMachinefor Windows deployments orCurrentUserfor Azure Web App deployments. - In the Thumbprint field, add the thumbprint value provided in the Windows certificate store. Details.
Note:
Replace all occurrences of
https://orchestratorURLwith the URL of your Orchestrator instance. Make sure that the URL of the Orchestrator instance does not contain a trailing slash. Always fill it in ashttps://orchestratorURL/identity, nothttps://orchestratorURL/identity/.
-
Select Save to save the changes to the external identity provider settings.
The page closes and you return to the Security Settings page.
-
Select the toggle to the left of SAML SSO to enable the integration.
-
Restart the IIS server.