Skip to main content
All CollectionsMentimeter for Teams and EnterprisesSSO and SCIM
SSO Configuration in OKTA (Enterprise plans only)
SSO Configuration in OKTA (Enterprise plans only)

Configure SSO for your Mentimeter workspace using OKTA.

Daniel avatar
Written by Daniel
Updated over a week ago

This guide is aimed at helping admins set up Single Sign-On (SSO) for their Mentimeter workspace using OKTA. Follow these detailed steps to ensure a smooth and secure setup process. For more information on setting up SSO, please refer to this article.

Before You Begin

Please ensure that the step of verifying email domains and adding a workspace name has been completed before proceeding with the SSO setup. This is a crucial prerequisite for a successful configuration, see more in this article.

Step 1: Create an Application in Okta

1. Navigate to Okta Admin Dashboard

  • Go to your Okta Admin Dashboard

  • Click “Applications” in the top menu

  • Select “Applications” from the dropdown

2. Add a New Application

  • Click “Create App Integration”

  • Choose “SAML 2.0” as the Sign-On method

  • Click “Next”

3. Configure SAML Settings

  • Enter “Mentimeter” as the App name

  • Click “Next”

Step 2: Configure Single Sign-On

1. Add Mentimeter’s SSO Details [Reference to the SSO article]

  • Sign in to your Mentimeter workspace as an Admin or Owner.

  • Go to the Mentimeter SSO setup page: SSO Setup.

  • Here you’ll find the links to enter in the following fields in OKTA under “SAML Settings”:

    • Reply URL → Single sign-on URL

    • Entity ID → Audience URI (SP Entity ID)

2. Configure User Attributes

  • Change the Name ID format to “Persistent”

  • Choose “Email” as the Application username

  • In the section of “Attribute Statements

  • Add “email” in the Name field and choose the value to be user.email

Optional, but recommended attributes to add:

  • “first name” → user.firstName

  • “last name” → user.lastName

  • Click “Next” and then “Finish”

Step 4: Add SSO Details in Mentimeter

1. Copy the data from OKTA, by accessing the Sign On Tab

  • Click on the “Sign On” tab within the OKTA application

2. Locate the SAML 2.0 Configuration

  • Scroll down to the “SAML 2.0” section

  • Here you will find the Metadata URL and the “Identity Provider Issuer” (Entity ID)

3. Paste Them into the Mentimeter SSO Setup Page

  • Go to the Mentimeter SSO setup page: SSO Setup

  • Paste the copied Metadata URL into the corresponding field

  • Click “Add SSO configuration”

Step 5: Finalize permissions and Test

1. Assign Users or Groups

  • Click the “Assignments” tab.

  • Click “Assign” and choose “Assign to People” or “Assign to Groups”.

2. Select Users or Groups

  • For “Assign to People”: Search and assign users, then click “Save and Go Back”

  • For “Assign to Groups”: Search and assign groups, then click “Save and Go Back”

Optional: You can also assign everyone to the application, meaning that anyone within your organisation are able to log in with SAML. This is only recommended if you have a central agreement and allow everyone to access your workspace.

3. Test SSO Configuration

  • To log in with SSO, go to Mentimeter SAML Login

  • Enter your Workspace name and sign in with the user’s credentials. (if you don’t know what it is, please ask your sales representative)

Once these steps are complete, you should be ready to sign in to Mentimeter with SSO using the account added to the application. You can now try to assign the correct users/groups to the application of those who should be able to sign in with SSO.

If you’re experiencing issues with the configuration, please contact your sales representative for assistance.

Did this answer your question?