If you have not enabled SSO yet, read SSO for workspace eligibility and the high-level flow before you follow the steps below.
Copy values from Planasonix
Open Settings → Security → SSO in Planasonix and copy:- ACS URL (Assertion Consumer Service URL)
- Entity ID (sometimes called SP Entity ID or Audience URI)
Create the SAML app in Okta
Start a new SAML integration
In the Okta Admin Console, go to Applications → Applications → Create App Integration. Choose SAML 2.0, then continue.
Name the application
Enter a clear name (for example,
Planasonix) and optional logo. Finish the initial wizard; you configure SAML on the next screen.Configure SAML settings
Under General:
- Single sign on URL: paste the ACS URL from Planasonix exactly as shown.
- Audience URI (SP Entity ID): paste the Entity ID from Planasonix exactly as shown.
- Name ID format: choose EmailAddress unless your Planasonix tenant documentation specifies Unspecified or another format your admin agreed on.
Attribute mapping
Map Okta profile and group attributes to SAML assertions so Planasonix can identify users and optional group membership.- Recommended claims
- Group assignment
| Okta attribute | SAML attribute name (typical) | Purpose |
|---|---|---|
| User email | email or http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress | Unique user identity |
| First name | firstName | Display and directory |
| Last name | lastName | Display and directory |
| Groups | groups or a custom claim | Teams and permissions when group sync is enabled |
Name ID format
Planasonix usually expects the Name ID to be a stable, unique identifier tied to the user’s email. EmailAddress is the most common choice. If you use a transient or opaque Name ID, confirm with your Planasonix admin that JIT provisioning and user matching are configured for that pattern.Finish in Planasonix
Upload Okta’s metadata XML or paste SSO URL, issuer, and X.509 signing certificate into Planasonix. Run a test login from an incognito window, then enforce SSO when you are ready.Related topics
SSO overview
SAML vs OIDC, certificate rotation, and org-wide enforcement.
Teams and permissions
How group claims map to workspace access.