Intermediate

Set up SAML with Okta and Screenly

Tutorial

Set up SAML with Okta and Screenly

Screenly offers SAML support with Okta. Screenly also supports SAML with Auth0, which you can learn more about here, and Azure, which can you find here.

SAML stands for “Security Assertion Markup Language” and allows users to transfer identity information between an identity provider (IdP) and a service provider (SP).

Please see below for more information on how to configure Screenly to work with SAML.

Metadata Location

If this is needed, here are the steps to find your metadata:

  1. Login to your Screenly account (only the account owner can complete this).

  2. Take the first part of the URL showing in your browser - e.g. https://YOUR-DOMAIN-HERE.screenlyapp.com/

  3. Then append “sso/saml_metadata_view” to the end of it - e.g. https://YOUR-DOMAIN-HERE.screenlyapp.com/sso/saml_metadata_view

  4. An example from a test account would look like: https://screenly-testing-inc.screenlyapp.com/sso/saml_metadata_view

  5. This will then bring up a page with your metadata.

Step by step set up for Okta SAML authentication

  1. Step One: Register at okta.com and navigate to the admin dashboard.

  2. Step Two: Add the SAML application to your Okta account. To do so, click Applications in the sidebar, then click Create App Integration. Next, select Web from the Platform dropdown menu. Then, select SAML 2.0 and click Create.

Okta SAML setup step 2.
  1. Step Three: The next task is to set your SAML configuration. For the Single sign on URL field, please enter:

https://login.screenlyapp.com/sso/complete/saml/

For the Audience URL (SP Entity ID) field, please enter:

login.screenlyapp.com

You can select Unspecified from the Name ID format drop-down menu.

  1. Step Four: Next, you must set the application’s attribute statements.

For the first attribute, enter:

name

with the value:

user.login

For the second attribute, enter:

email

with the value:

user.email

You can leave the Name format field for each attribute as Unspecified.

Okta SAML setup step 4.
  1. Step Five: On the next page, users must select the I’m an Okta customer adding an internal app option.
Okta SAML setup step 5.
  1. Step Six: After creating the okta app, users must navigate to the Sign On tab in the app settings section and click Copy Metadata URL. Save content of the URL as a file.
Okta SAML setup step 6.
  1. Step Seven: Assign your new Okta app to users within your Okta account.
Okta SAML set up step 7.
  1. Step Eight: Log into your Screenly account, and go to the SAML section found in Settings ==> Teams.
Okta SAML setup step 8.
  1. Step Nine: Import your file from step 6 to fill in the configuration fields.

  2. Step Ten: Save the configuration, and now SAML should be configured. You can test this by clicking the ‘Copy URL’ button below the SAML settings in Screenly, logging out of Screenly, then pasting the URL into the browser to login.

  3. Step Eleven: Return Back to Okta console on Sign On section and fill in RelayState(this field is required if you want to use IdP-initiated flow). RelayState equals hash that takes from the Screenly SAML URL login (/sso/login/saml?idp=HASH).

That completes the setup.

What is the user authorization process with SAML?

Okta SAML setup authorization.

First, the owner sends the SAML login url. This is necessary to invite a new user.

Next, the user redirects to the IdP authorization screen.

The next step is for the user to complete authorization. When the user completes IdP authorization, the IdP redirects the user back to Screenly with the IdP’s response.

The user can then register as a new user or, if the user already exists, the user can merge his or her account. This process is the same registration process as SSO.

That’s all for now!

Recent Tutorials

Display your best content with Screenly digital signs.

Screenly is loaded with features to make digital signage management easy.

footer screen image
manage cookies