Enabling SAML SSO with Okta
Harvest supports SAML single sign on (SSO) through Microsoft Entra ID and Okta. This article covers setting up Okta SSO for your Harvest account. For steps to set up Microsoft Entra ID see our article on enabling Microsoft Entra ID.
You can also find more information about SAML SSO in Harvest in our articles on Signing in to Harvest using SAML SSO and SAML SSO for Microsoft Entra ID and Okta FAQ.
How to enable SSO via Okta
Enabling SSO via Okta for your Harvest account is a multi-step process that requires gathering and recording information from/to both Okta and Harvest. For this reason, we recommend keeping Okta and Harvest both open in separate tabs of your browser while you enable the integration.
Note: Only Administrators can access these settings.
Step 1: Add Harvest application in Okta
- In Okta, select the Applications drop-down from the menu on the left.
- Select Applications.
- Click on Create App Integration.
- Select SAML 2.0
- Enter "Harvest" as the app name.
Step 2: Get SAML values from Harvest
- In Harvest, go to your Settings.
- Click Sign in security in the left sidebar.
- Click Configure SAML… next to SAML.
- You’ll see two values on this page with copy icons. You’ll need to copy and paste these values into Okta by following the steps below.
Step 3: Add SAML Harvest data to Okta
- Paste the Single sign-on URL and Audience URI (SP Entity ID) into the same fields in Okta.
- Click Next.
- Select the This is an internal app we have created option.
- Click Finish.
- Back in Harvest, click Continue to take you to the next page.
Step 4: Add Okta metadata URL to Harvest using the Metadata URL
- In Okta, click on the Sign on tab and copy the Metadata URL.
- In Harvest, paste the Metadata URL into the Identity Provider XML configuration URL field in Harvest.
- Click Save.
You’ll see a confirmation message at the top of Harvest ID letting you know SAML with Okta has been enabled.
Alternate step 4: Set up Okta SSO with Harvest using the Sign in URL + certificate
We recommend completing step 4 using the Metadata URL from Okta as outlined above, but you can also complete this step using the Sign in URL and manually entering the Identity Provider certificate by taking the steps below:
- In Okta, click on the Sign on tab and then click More Details to expand it.
- Copy the Sign on URL.
- In Harvest, paste this URL into Harvest’s Sign in URL box.
- Back in Okta, click on Generate new certificate.
- On the new certificate, click on Actions > Activate.
- Click on Actions > Download certificate.
- Open that certificate in a text editor, like the Text Edit app.
- Copy the entire content and paste it into the Identity Provider certificate box in Harvest.
- Click Save.
You’ll see a confirmation message at the top of Harvest ID letting you know SAML with Okta has been enabled.
Step 5: Assign users to the Harvest application in Okta
- In Okta, go back to the General view of your application and click on Assignments.
- Click Assignments.
- Click Assign to People and search for the necessary accounts to link.
- Please note that this will not add someone to your Harvest account. Harvest doesn’t offer SCIM provisioning at this time.
- Save the assignment(s).
Require sign in with Okta in Harvest
Warning: Before making sign-in required with SAML SSO, be sure you’ve added yourself and all teammates as users in your created Harvest app in Okta to ensure they’ll be able to sign-in via SAML.
If you’ve just enabled SAML SSO via Okta following the steps above and you want to require everyone in the account to sign in with Okta, please follow these steps:
- Next to SAML, you’ll notice that the option to Require sign in with Okta is grayed out. To change this, click Sign in with your Okta account in the notification.
- Enter the email address associated with your Harvest account. This will take you to Okta to sign in.
- Once you have signed in to your Harvest app using Okta, you’ll be redirected back to Harvest. In Harvest, return to your Settings.
- Click Sign in security in the left sidebar.
-
Next to SAML, check the box to Require sign in with Okta.
- You’ll see a warning that saving this setting will sign out anyone who isn’t currently signed in with Okta.
-
We’ll also send your team an email to let them know about this change. If you’re okay with this, click Save settings to require signing in with Okta.
How to disable SSO via Okta
Note that when SSO is disabled, everyone currently signed in with Okta will be signed out.
- In Harvest, go to your Settings.
- Only Administrators can access Settings.
- Click Sign in security in the left sidebar.
- Next to SAML, click Disconnect SAML.
- Click Disconnect SAML to disconnect.
What happens when I disable SSO via Okta?
SSO via Okta is enabled, but your team is not required to sign in via Okta
-
Everyone who is currently signed in with Okta will be immediately signed out.
-
We will send emails to every user who doesn’t currently have a password set letting them know they need to set a password.
You require your team to sign in to Harvest via Okta
- Everyone who is currently signed in with Okta will be immediately signed out.
- We will send an email to every Harvest Administrator letting them know that signing in with Okta is no longer required.
- We will send emails to every user who does not currently have a password set letting them know they need to set a password.