Single Sign-On (SSO) through Okta (SAML)
Learn how to set up Single Sign-On (SSO) with OpenText Core SCA through Okta.
This feature is currently only available for SCA Enterprise customers.
You can set up Security Assertion Markup Language (SAML) Single Sign-On (SSO) with Okta to let users authenticate through their organization’s identity provider rather than maintaining separate application credentials. Once configured, users can securely access the application using their corporate accounts, while administrators retain centralized control over authentication and access management.
Supported features
Single Sign-On (SAML) initiated through Okta
Automatic account creation in OpenText Core SCA on initial sign-on
Requirements
The Okta Single Sign-On integration is only available for the Enterprise customers.
To complete the integration, you must:
Have an Okta account with administrator rights.
Configuration
To configure your SSO integration with Okta, follow these steps:
Service Provider (SP) configuration
Enter the following details in Okta when setting up the SAML application:
Single Sign-On URL (ACS URL)
https://debricked.com/app/sso/saml/acs
Audience URI (Entity ID)
https://debricked.com/app/sso/saml/metadata/{Employer_id} (Refer to the OpenText Core SCA's Metadata file for the employer ID)
NameID format
EmailAddress
Application username
Configure the application in Okta
In the Okta admin page, click the Applications tab.
Click Create App Integration.
Select SAML 2.0 as the sign-in method.
Enter an application name, then click Next.
In SAML Settings, enter the ACS URL and Entity ID provided above.
Set the Name ID format to EmailAddress.
Continue through the setup wizard and create the application.
Map the attributes
Configure the following attribute statements:
Yes
user.email
fname
Yes
user.firstName
lname
Yes
user.lastName
Email addresses must be unique and immutable to ensure consistent and reliable account linking.
Retrieve Identity Provider metadata
After creating the application:
In the Okta admin page, open the newly created application.
Navigate to the Sign On tab.
Scroll to the SAML Signing Certificates section.
Copy the Identity Provider Metadata URL or download the metadata XML file.
Share this metadata with the support team or use the https://debricked.com/api/1.0/open/sso/saml/request API endpoint to post the request along with the other required details.
Sample payload
Troubleshooting
If you run into issues while setting up or signing in with Okta, try the following checks:
Verify configuration
Make sure the ACS (Assertion Consumer Service) URL matches exactly with the value provided in OpenText Core SCA.
Confirm that the Audience URI (SP Entity ID) is identical to the value expected by OpenText Core SCA.
Check that you are configuring the correct environment (Production vs. Staging).
Ensure SAML 2.0 is selected as the sign‑on method.
Verify that the application is assigned to the appropriate users or groups (Applications → Your App → Assignments).
Even minor discrepancies such as an extra space or a trailing slash in the ACS URL or Audience URI can cause authentication to fail.
Validate email and NameID configuration
Okta does not automatically ensure that the NameID equals the user’s email address. Confirm the following settings:
The Application username format is set to Email.
The NameID format is configured as EmailAddress.
The NameID value sent by Okta exactly matches the user’s email in OpenText Core SCA.
Email case and domain match perfectly (no mismatches such as uppercase/lowercase or
@company.comvs@sub.company.com).The user exists in the correct OpenText Core SCA organization.
The email domain is verified in OpenText Core SCA.
Common issue:
Okta sends the username instead of the email as NameID.
Review attribute statements
Navigate to Applications → Your App → Sign On → Edit → Attribute Statements and ensure these attributes are correctly configured:
email→user.emailfname→user.firstNamelname→user.lastNameemail→user.emailfname→user.firstNamelname→user.lastName
Common issues:
Missing attribute statements
Incorrect attribute names
Username sent instead of email
Attribute values resolving to
null
Inspect the SAML assertion
Use one of the following to inspect the SAML response:
Okta System Log
A browser SAML tracer extension
In Okta, navigate to System Log → Filter by user email or event types:
app.auth.ssoapp.auth.sso.faileduser.authentication.failed
Check the SAML response for:
Correct NameID value
Valid Audience URI
Correct Destination (ACS URL)
Signature validity
Accurate attribute values
Common errors and resolutions
❌ You don’t have access to this app
Cause
User or group not assigned
Email or NameID mismatch
Resolution
Go to Applications → Assignments.
Assign the required user or group.
Ensure NameID or email matches the value expected by OpenText Core SCA.
❌ The audience is invalid
Cause
Audience URI mismatch
Extra or trailing slash
Wrong environment (staging vs production)
Resolution
Copy the Audience URI directly from OpenText Core SCA metadata.
Remove trailing spaces or slashes.
Save changes and retry.
❌ The recipient is invalid or destination mismatch
Cause
Incorrect ACS URL
Resolution
Copy the ACS URL exactly from Core SCA metadata.
Check for hidden whitespace.
Confirm the correct environment is used.
Last updated
Was this helpful?

