SAML 2.0 Configuration
Supported Features
The Okta/Cloudsaver Tag Manager SAML integration currently supports:
- IDP-Initiated SSO
- SP-Initiated SSO
- SLO (Single Logout)
- JIT (Just-In-Time) Provisioning
IDP-Initiated SSO
This configuration involves 20 steps coordinating settings between the Okta Admin console and Cloudsaver:
- Navigate to Applications > Browse App Catalog in Okta
- Search for and select CloudSaver – Tag Manager
- Click Add Integration
- Verify application name in General Settings and click Done
- In Cloudsaver, go to Settings > Single Sign-On
- Click Set Up SSO to display Configure Single Sign-On page
- Enter "Okta" as Identity Provider
- Download the PEM Certificate from SAML Identity Provider Configuration
- In Okta's Sign On tab, click Edit
- Upload Cloudsaver certificate to Encryption Certificate field
- Expand More Details section
- Download the Signing Certificate
- In Cloudsaver, upload the certificate under X509 Signing Certificate
- Copy the Single Sign-On URL from SAML Identity Provider Configuration
- Paste into Okta's Advanced Sign-on Settings
- Copy Okta's Sign on URL value
- Paste into Cloudsaver's Sign-in URL field
- Copy Cloudsaver's Entity ID
- Paste into Okta's Entity ID field and save
- Submit Configuration in Cloudsaver
SP-Initiated SSO
- Complete IDP-initiated setup first
- Navigate to Settings > Single Sign-On and select Change SSO Settings
- Enter email domain name (e.g., "cloudsaver.com" for test@cloudsaver.com)
- Click Submit Configuration
- Test at https://app.cloudsaver.com/ by entering your email
SLO (Single Logout)
- Complete IDP-initiated setup first
- Navigate to Settings > Single Sign-On and select Change SSO Settings
- Copy the Single Sign-Out URL
- In Okta application, view Sign On tab and click Edit
- Check Enable Single Logout field
- Download PEM Certificate from Cloudsaver
- Upload certificate to Okta's Signature Certificate field
- Expand More details section
- Copy the Single Logout URL
- Paste into Cloudsaver's Sign-out URL field and submit
- Save in Okta application page
Supported SAML Attributes
The following SAML attributes are supported:
- User.firstName— user.firstName
- User.lastName— user.lastName
- User.email— user.email
Important Notes
Ensure correct Subdomain entry in the General tab to avoid authentication failures. Incorrect values will prevent SAML authentication to Cloudsaver Tag Manager.
Want to see how this applies to your environment?
Get your free savings assessment