Legacy: Set up SAML authentication with Okta
Last Updated: September 27, 2023
đPlease note: This article is for customers on Standard Bundle, Enrichment, or Clearbit Platform plans.Â
To initiate and complete the SAML authentication setup, you'll need to work with a Clearbit Implementation Manager. Please contact Clearbit Support for assistance.
Â
Â
The instructions below outline the steps your Okta administrator must take to create, activate, and assign users to access Clearbit apps through SAML authentication.
Create a custom SAML 2.0 app in Okta
Clearbit integrates with Okta through a custom SAML app setup, and isn't available in Okta's integration library.
Disclaimerâď¸: The Clearbit SWA integration isn't a replacement for SAML authentication. Secure Web Authentication (SWA) refers to a technology used by Okta to provide SSO for external applications that don't support SAML and is akin to a password manager (e.g. it saves and reuses your password when logging into websites).
To create the custom SAMLS app:
- Navigate to the Admin Console in Okta and go toÂ
- Create App Integration, click SAML 2.0 as the sign-in method, and click Next.
- Enter a name for the app (e.g. Clearbit). Optionally, add a description and icon (this icon is recommended), and click Next.
-
Complete the General SAML Settings with the following information:
- Single sign on URL: a unique URL will be provided by the Clearbit team.
- Audience URI (SP Entity ID): a unique URL will be provided by the Clearbit team.
- Name ID format: EmailAddress
- Application username: Okta username
-
Add the following attributes statements (required):
- firstName > Unspecified â user.firstName
- lastName > Unspecified â user.lastName
- Click Next, click I'm an Okta customer adding an internal app, then click Finish.
Assign users or groups to the custom SAML 2.0 app
Before you get started, it may be helpful to identify all users who currently have access to your Clearbit account. To view all users, in your account, navigate to Teams > Users.
Assign individual users
To assign users to the Okta app:
- Navigate to Directory > People.
- Click on the name of the user you want to assign. Select Assign Applications and click Assign for the Clearbit SAML app you created in the previous step.
- Click Save.
Assign groups
To assign the application to a group:
- In the admin console, navigate to Application > Applications.
- Search for the Clearbit SAML app. Then, click on the Assignments tab.
- Select Assign to Groups, and click Assign for the groups you would like to add.
- Click Save and go back
- Click Done.
Share your SAML app details with the Clearbit team
To complete the implementation, you'll need to share important SAML app details with the Clearbit team. After you've created your custom SAML application, follow these instructions to access and share the required information:
- In the SAML setup section of your app, click View SAML setup instructions.
- Copy and share the following configuration information with the Clearbit team:Â
- Identity Provider Single Sign-On URL
- Identity Provider Issuer
- X.509 Certificate
Enable SAML authentication
SAML authentication must be enabled by a Clearbit employee using the information you shared in the previous step.
Once you have successfully created the SAML app, assigned users, share your app details with the Clearbit team, and are ready to enable SAML authentication, contact Clearbit to complete the setup process.
If you would like to coordinate the enablement and testing of your app, the Clearbit team is happy to arrange a call to complete the setup together and answer any questions.
Learn More
Â
Articles in this section
- How Does the Clearbit Community Data Opt Out Work?
- Delete your Clearbit account
- Legacy: Set up multi-factor authentication (MFA)
- Legacy: How Clearbit's SSO SAML authentication works
- Legacy: Set up SAML authentication with Okta
- Legacy: Set up SAML authentication with Azure
- Legacy: Set up SAML authentication with JumpCloud
- Legacy: Set up SAML authentication with Google SSO
- Legacy: Custom SAML authentication setup