Page tree

Versions Compared


  • This line was added.
  • This line was removed.
  • Formatting was changed.


  1. Log in to your Okta issued URL.
  2. After successful login to Okta, go to the admin section
  3. Create a new application as shown below

    In the application type, select SAML 2.0

  4. Configure the Application as follows.

    1. Set Single sign on URL tp the FileCloud assertion URL http://<your domain>/simplesaml/module.php/saml/sp/saml2-acs.php/default-sp
    2. Set Audience URI (SP Entity ID) to http://<your domain>/simplesaml/module.php/saml/sp/metadata.php/default-sp
    3. Set Default Relay State to http://<your domain>/auth/samlsso.php
      The attribute statements must be set as shown in the screenshot.  These attribute names must match the names set in the FileCloud admin screen - Settings SSO parameters for Username, Email, Given Name and Surname.

  5. In the following screen set FileCloud as an Internal App.

  6. Click FInish.

  7. Click View Setup Instructions to get the details to configure FileCloud SSO.
    The How to Configure SAML 2.0 for MyIdp Application screen opens.

  8. Get the details for configuring FileCloud from this screen.  
    1. Copy the entity ID field from the Metadata text box on OKTA and use that for Idp End Point URL in FileCloud admin (Settings) - Must be the same as the entity ID value from the IDP Meta Data value in the screen (See Screen Shot below)Download the Certificate. Copy the certificate  file UI interface under Settings > SSO.
    2. Click Download certificate, then copy the certificate file and rename to saml.crt. Copy this file in the FileCloud server in the following place <FileCloud WEB ROOT>/thirdparty/simplesaml/cert
    3. The metadata in this screen must match the IdP meta data in FileCloud Admin Settings - > SSO - Idp Metadata.

Copy the ENTITY ID field from the Metadata text box on OKTA and use that for Idp End Point URL in FileCloud admin UI interface.


Image Removed


    1. Meta data.
      Image Added

  1. Add the user under the


  1. People tab in Okta.
    Image Modified

    The configuration from FileCloud side should be in 'Settings > sso' as follows (in 'idP End Point URL' you should make 'Identity Provider Issuer') :


  1. Image Modified

Once the application is created and FileCloud is configured you can start using the Single Sign On with Okta from FileCloud