Configure SSO for Okta
How to configure SSO for UKG Authentication and OktaTM.
UKG Authentication can support a maximum of 7 SSO connections.
Note: The following people are required to complete this configuration: An IT Member who has access to Okta, and an HR Administrator who has access to the SSO tool for the UKG Pro suiteUKG Pro Workforce Management. Each of the following steps indicates which person completes that step. Alternatively, a single administrator who has access to both systems can complete this configuration.
- (IT Member role) Log in to Okta.
- (IT Member role) Create a new Enterprise Application instance; do not select an existing instance.
- (IT Member role) Create the Metadata URL as follows:
- Single Sign On URL: Enter a placeholder value. Example: https://fsso.placeholder.com
- Select Use this for Recipient URL and Destination URL.
- Do not select Allow this app to request other SSO URLs .
- Audience URI (Entity ID): Enter a placeholder value. Example: https://fsso.placeholder.com
- (IT Member role) The remaining Claims and Attributes are the same as for the existing applications.
- (IT Member role) Click Next and Next.
- (IT Member role) In the Sign On tab, in , click Copy and give the Metadata URL to the HR Administrator.
- (HR Administrator role) Log in to the UKG Pro suiteUKG Pro Workforce Management.
- (HR Administrator role) Do either of the following:
- If you are configuring SSO before the upgrade, select , Then, select Configure your Single Sign-On (SSO) connection and click Configure SSO.
- If you are configuring SSO after the upgrade, select System Management > Security > Authentication > SSO Configuration. Then, select and click Configure SSO.
- If you are configuring SSO after the upgrade, select Main > Administration > Identity SSO Config. Then, select and click Configure SSO.
- (HR Administrator role) Configure the following:
- Enter the Configuration name in the Button label field. This name identifies the SSO configuration to the employees. It must be unique, contain no spaces, and should include "SSO" and "UAT" or "PROD". Examples: UKGSSOUAT for the UAT, NPR, or Test environment and UKGSSOPROD for the Production environment.
- In Current IdP information, select Metadata and enter or paste the Metadata URL for Okt.
- In Security settings, select both Notify IdP about callbacks and Sign SAML request to establish the most secure connection.
- In Bindings, select HTTP POST (recommended) to send data securely in the body of the request.
- Keep the default
NameIdfor the SAML assertion attribute. Normally, you do not change this value. - Click Next.
- (HR Administrator role) Copy the Metadata URL and give it to the IT Member.
- (IT Member role) Paste the Metadata URL in the Address bar of a browser.
- (IT Member role) From the XML file that opens, copy the
entityIDandASC Locationsfor your IDP fields. - (IT Member role) Return to Okta and do the following:
- Replace the Audience URI (Entity ID) with the
entityIDfrom the XML file. - Replace the Single Sign On URL (Assertion Consumer Service URL) with the
ASC Locationsfrom the XML file. - Assign the appropriate Users and Groups to the application.
- Replace the Audience URI (Entity ID) with the
- (HR Administrator role) In the UKG Pro suiteUKG Pro Workforce Management, do the following:
- Click Test Connection to open the tab.
- Log in with your user credentials.
- If the login failed because of an incorrect configuration in Okta, the error shows Okta's or your organization's logo. Ask the IT Member to check that the User, Group, Entity ID, Assertion URL, and Sign-on URL are correct in Okta. Close the tab.
- Select I configured the IdP by entering the metadata URL in the settings and click Next.
- Map the vanity URL to the SSO connection as follows: Select the vanity URL to use for this SSO connection. All available URLs are listed. Click All Done! If the IT Member needs the SSO URL, copy this URL and give it to the IT Member.
- (HR Administrator role) (Optional) To test, edit, or delete a connection, click the three vertical dots button for that SSO connection and select Test Connection, Edit, or Delete.
- (HR Administrator role) To add another SSO connection, click Add SSO and repeat the previous steps.
- (HR Administrator role) (Optional) If Test Connection failed earlier, the IT Member added the user account, but the error persists, click the three dots and select Edit.
- Remove the Metadata URL value that the IT Member provided, copy the URL again, and paste the same value again in Metadata URL.
- Click Next.
- If Test Connection continues to fail, make sure that the Entity ID and Assertion Location values are entered correctly in the IDP.
- If the error persists, contact UKG for support.
- (HR Administrator role) When all SSO connections are tested successfully, return to the Authentication Upgrade tool and expand Configure your Single Sign-On (SSO) connection (Required) to refresh and check the settings.
- Select Administration > Authentication Upgrade.
- Expand Configure your Single Sign-On (SSO) connection (Required) .
- Click Refresh. Make sure that the check mark turns green.
