Skip to main content

Okta

Highway supports both SAML and OIDC integrations with Okta.

Paige Ip avatar
Written by Paige Ip
Updated this week

Option 1: Use Highway’s Published OIDC App

Supported Features

  • SP Initiated Auth Flow: SSO using OIDC initiated via Highway's sign in page.

  • Just in Time provisioning: Automates the creation and access of user accounts for Highway through Okta.

Requirements

  • Administrative access to your Okta environment.

Configuration in Okta

First, you will need to add the integration to your company Okta environment.

  1. Navigate to the Okta Integration Network catalog.

  2. Click search and enter "Highway" or simply click here.

  3. From the Highway integration page, click the blue "add integration" button.

  4. Leave the default name for the application as "Highway" and continue.

You may be redirected to the "Assignments" tab of the newly added Highway application. From here, you can assign specific users or groups that may require access to Highway or enable it for your entire organization.

Configuration in Highway

To complete setup, you will need to work with a member of our implementations team to make sure this integration works as expected.

  1. Go to the Sign-On tab of the Highway application within your Okta environment.

  2. Note the values of the Client ID and Client Secret fields.

  3. Note the URL of the OpenID Provider Metadata.

  4. Email your Highway Sales Engineer with the subject "RE: Okta SSO for Highway" along with the following:

    1. Client ID value

    2. Client Secret value

    3. OpenID Provider Metadata URL

    4. List of your company email domains this should be configured for

Once received, our team will configure the requested domains within Highway to communicate with Okta. After completion, you'll receive an email from a member of our team to confirm.

📘Reminder...

After this has been configured, all logins will begin to utilize SSO with Okta. Highway will no longer send OTP authentication codes to your broker-users via email/text.

After Activation

The flow for logging in after successful setup will be as follows.

SP (Highway) Initiated:

  1. Visit https://highway.com/broker/login and enter your email address just like normal.

  2. For email addresses on a registered domain, you'll be redirected to Okta to log in with your company Okta credentials or logged right into Highway if there is an active Okta session within your browser.

Option 2: Create a Custom SAML Application

Setting up a new custom SAML application in Okta is a straightforward process that uses their App Integration Wizard. Okta serves as the Identity Provider (IdP), and your SaaS product is the Service Provider (SP).

Create a New App Integration

  1. Log in to your Okta Admin Console.

  2. In the left-hand navigation menu, go to Applications > Applications.

  3. Click the Create App Integration button.

  4. In the modal, select SAML 2.0 as the sign-in method, then click Next.

  5. On the General Settings tab, provide a name for your application and optionally upload an application logo.

  6. Click Next.

Configure SAML Settings

  1. On the Configure SAML page, under the SAML Settings section, set the following values:

Variables

Value

Single sign-on URL

https://highway.com/identity/saml/consume

Audience URI

https://highway.com/identity/saml/metadata

Default RelayState

Leave blank

Name ID format

Select EmailAddress

Application username

Select Email

Update application username on

Select Create and Update

Attribute Statements

Add mappings for first_name and last_name and map to user.firstName and user.lastName

  1. Click Next and Finish

Provide IdP Metadata back to Highway

  1. On the new application's Sign On tab, under the SAML 2.0 section, click View Setup Instructions.

  2. Download the IdP metadata XML file.

  3. Send the downloaded file to Technical Sales Engineer at Highway

Assign Users and Groups

  1. Go to the application's Assignments tab.

  2. Click the Assign dropdown and select either Assign to People or Assign to Groups.

  3. Select the users or groups you want to grant access to and click Assign.

  4. For individual users, you may need to confirm their username. Click Save and Go Back.


Additional resources from Okta

Did this answer your question?