Input Fields | Description |
---|
Single Sign-On URL (SSO URL) | Please provide the SAML endpoint URL in EID for SAML assertion that accepts HTTP POST. Input https://{yourempoweridurl}/WebldPPorms/Generic/AuthenticationResponse as the URL. Replace 'yourempoweridurl' with your organization URL used to access EmpowerID, such as sso.empoweriam.com. |
Recipient URL | Provide the URL or endpoint where the Okta sends a SAML assertion to the EID during the Single Sign-On process. This URL will be the same as the SSO URL provided earlier; input https://{yourempoweridurl}/WebldPPorms/Generic/AuthenticationResponse as the URL. Replace 'yourempoweridurl' with your organization URL used to access EmpowerID, such as sso.empoweriam.com. |
Destination URL | The destination URL specifies the destination within the SAML assertion where the SAML response is meant to be delivered from Okta. This URL will be the same as the SSO URL provided earlier; input https://{yourempoweridurl}/WebldPPorms/Generic/AuthenticationResponse as the URL. Please replace 'yourempoweridurl' with the URL used to access EmpowerID, such as sso.empoweriam.com. |
Audience URI | Provide the specific identifier that serves as the intended recipient of a SAML assertion or response; please input EmpowerID. This should be the same as what we have provided in when we specify the SP Name Qualifier later while configuring the SAMl SAML connection in EmpowerID earlier. |
Name ID format | Leave unspecified for the Name ID Format. |
Application User Name | To identify a user within a specific application or service, you must provide their identifier or username. In the case of EmpowerID, you should select the AD SAM account name. To make this possible, you must create the attribute mapping for the AD SAM account name in your Active Directory in Okta. Once you have done that, you can choose the field here. |