Skip to content

Integrate Okta

Okta SAML/SSO Integration

Want to connect Okta with Tallyfy? You’ll be setting up SAML-based Single Sign-On (SSO) that handles user authentication and creates accounts automatically. Takes about 30 minutes.

Requirements

  • Okta administrator account
  • Tallyfy Professional or Enterprise plan
  • SAML configuration values from Tallyfy Support

Implementation process overview

Here’s what you’ll do:

  1. Create an Okta SAML application
  2. Configure settings in both systems
  3. Turn on SSO and test it works

Phase 1: Create Okta SAML application

Step 1: Access application management

  1. Sign in to the Okta Admin Console

  2. Switch to Classic UI from the dropdown in the top left header

    Classic UI selection

  3. Navigate to Applications > Applications

  4. Click Add Application

    Applications menu

  5. Select Create New App

    Create New App button

  6. In the modal dialog, select Web for Platform.

  7. Select SAML 2.0 for Sign-on method.

  8. Click Create.

    Create new application modal

Step 2: Configure general settings

  1. Enter “Tallyfy” as the application name
  2. Optionally upload the Tallyfy logo
  3. Click Next

Phase 2: Configure SAML settings

Step 1: Obtain Tallyfy SAML values

First, you’ll need to grab Tallyfy’s SAML values - these tell Okta where to send login information:

  1. Contact Tallyfy Support to access your organization’s profile
  2. Navigate to the Org Settings tab
  3. Click on Add Configuration Details
  4. Locate the default SAML values section

Step 2: Enter SAML settings in Okta

Time to configure Okta with those values you just got:

  1. Single Sign On URL: Enter the value from Tallyfy’s “SP ACS URL” field

  2. Keep Use this for Recipient URL and Destination URL checkbox selected

  3. Audience URI (SP Entity ID): Enter the value from Tallyfy’s “SP Entity ID” field

    SAML settings configuration

  4. Click Show Advanced Settings

  5. Change Authentication context class to X.509 Certificate

Step 3: Configure attribute statements

Next, tell Okta which user information to send to Tallyfy:

NameName FormatValue
emailUnspecifieduser.email
FirstNameUnspecifieduser.firstName
LastNameUnspecifieduser.lastName
Attribute statements configuration
  1. After adding the attributes, click Next.

Step 4: Complete Okta configuration

  1. Select I’m an Okta customer adding an internal app
  2. Check This is an internal app that we have created
  3. Click Finish

Phase 3: Configure Tallyfy with Okta information

Step 1: Obtain Okta SAML information

  1. Navigate to the Sign On tab in your Okta application

    Sign On tab

  2. Scroll down and click View Setup Instructions

    View Setup Instructions

  3. The page will display the SAML configuration details for the identity provider

Step 2: Provide information to Tallyfy Support

  1. Send the Identity Provider Single Sign-On URL to Tallyfy Support.
  2. Send the Identity Provider Issuer to Tallyfy Support.
  3. Send the X.509 Certificate to Tallyfy Support.
  4. Tallyfy Support will configure these values in your organization’s SAML settings.

Step 3: Enable SAML authentication

After Tallyfy Support confirms they’ve configured your settings:

  1. Toggle the SAML activation switch to enable SSO for your organization

User provisioning and access

Once everything’s set up:

  1. Get the Tallyfy login URL from the SAML configuration modal (Tallyfy Support provides this)
  2. Share this URL with your users who have access to the Okta application

Here’s how it works for your users:

  • Already have a Tallyfy account? They’ll log in automatically
  • Don’t have an account yet? Tallyfy creates one on their first login

Troubleshooting

Can’t log in? Check these things first:

  • Is the user assigned to the Okta application?
  • Are the attribute mappings exactly right? (names and formats matter)
  • Are users using the SSO URL - not the regular Tallyfy login page?
  • Still stuck? Contact Tallyfy Support

Authentication > Integrate OneLogin

A comprehensive walkthrough for setting up SAML Single Sign-On between OneLogin and Tallyfy by creating an application connector configuring SAML settings enabling user provisioning and testing the authentication flow.

Authentication > Integrate Azure AD

This comprehensive guide explains how to establish SAML-based Single Sign-On integration between Microsoft Azure Active Directory and Tallyfy through enterprise application creation SAML configuration and user provisioning setup that enables automated authentication for existing users and automatic account creation for new users accessing through the designated SSO URL.

Authentication > Integrate Google Suite

The comprehensive guide outlines the process of implementing SAML-based Single Sign-On between Google Workspace and Tallyfy through application setup attribute mapping and user access configuration for automated authentication.

Integrations > Authentication and SSO

Tallyfy offers free Single Sign-On integration for paid plan customers that connects with enterprise identity providers like Microsoft Azure AD Google Workspace Okta and OneLogin to enable centralized authentication automated account provisioning enhanced security through existing corporate credentials and optional SSO-only enforcement for maximum compliance control.