Who can use this feature?
- Admins
- Available on all plans
Unison supports single sign-on (SSO) with Okta for managing user access to the Unison platform.
Before you begin
Here's what you need:
- Administrator access to your Okta tenant
- The list of users who need access to Unison
Additional considerations
- All users must have a valid email address, first name, and last name in Okta
- User access is managed through Okta assignments; add or remove users as needed
- For security, consider requiring MFA for the Unison application in your Okta settings (optional)
Step 1: Create a SAML application in Okta
- Log in to your Okta Admin Dashboard.
- Navigate to Applications > Applications.
- Click Create App Integration.
- Select SAML 2.0 as the Sign-in method, and click Next.
- Configure Basic Settings:
- App name: Unison
- App logo: Upload your company logo (optional)
- Click Next.
Step 2: Configure SAML Settings
- Configure SAML Settings:
- Single Sign-On URL:
https://totango-unison.eu.auth0.com/login/callback
- Audience URI (SP Entity ID):
urn:auth0:totango-unison:connection-name-provided-by-unison
- Name ID Format: EmailAddress
- Application username: Email
- Single Sign-On URL:
- Configure Attribute Statements:
- Add the following attributes with Name Format set to Basic:
- Name: email → Value: user.email
- Name: firstName → Value: user.firstName
- Name: lastName → Value: user.lastName
- Add the following attributes with Name Format set to Basic:
- Click Next.
Step 3: Finalize application setup
- Select the appropriate visibility settings for your organization.
- Choose "I'm an Okta customer adding an internal app."
- Click Finish to create the application.
Step 4: Assign users to the application
- Navigate to your newly created application.
- Click the Assignments tab.
- Click Assign, and select either:
- Assign to People (for individual users)
- Assign to Groups (if you want to manage access via groups)
- Select the appropriate users or groups.
- Click Assign, and then Save and Go Back.
Step 5: Download SAML metadata
This step is required for Unison team to configure SSO.
- Go to the Sign On tab of your application.
- Find the section for SAML (SHA-2) Signing Certificates.
- Click the Actions drop-down for the active certificate.
- Select View IdP metadata.
- Send the URL for the IdP metadata to your Unison CSM. Example:
https://dev-44236121.okta.com/app/exkopzsr50I2v3kOY5d7/sso/saml/metadata
Step 6: Test the integration
Once the Unison team confirms your SSO configuration is complete:
- Log out of any existing Unison sessions.
- Open a new browser window in incognito/private mode.
- Navigate to Unison: https://unison.totango.com.
- Enter your work email address.
You should be automatically redirected to your Okta sign-in page. - After authenticating, you should be redirected back to Unison.
Troubleshooting
If you encounter any issues:
- Verify the SAML configuration in Okta matches the settings provided in this guide.
- Ensure users are properly assigned to the application.
- Check that the email domains for assigned users match those provided to the Unison team.
- Contact Unison support for assistance.