Okta SSO Integration

Okta is an identity and access management service provider. Testim integrates with Okta, allowing users of Okta to authenticate once in Okta and then access Testim without authenticating again.


SSO is a premium feature. Make sure the SSO feature is enabled for your deployment. If it is not, contact your Testim CSM.

To setup the Testim Okta integration:

  1. Login to the Okta Admin account.
  2. Go to Applications > Applications.
  3. Click Create App Integration.
  1. Select the 'SAML 2.0 option.
  1. Click Next.
    The General Settings screen is displayed.
  1. In the App Name field, enter a name for the connector app, such as 'Testim SSO'..
  2. Click Browse to select the Testim logo and then Upload Logo to upload it (optional).
  3. You can optionally add a description that will help your users know more about Testim.
  4. Click Next.
    The Configure SAML screen is displayed. At this point the connector has been created. Now you need to connect it to Testim.
  5. In another tab open Testim Automate, and click the user icon, located in the top-right corner.
  1. In the drop-down menu, click Settings and click the SSO tab.
  2. Under Testim Service Provider Details, under Assertion Consumer Service URL, click the Copy button.
  1. Go back to the tab where you have Okta open and paste the copied Assertion Consumer Service URL into the Single sign on URL field.
  1. Go back to the Testim Automate tab and copy the SERVICE PROVIDER ENTITY ID/AUDIENCE code.
  2. In the Okta tab, paste this code into the Audience URI (SP Entity ID) field.
  3. Still in Okta, in the Name ID format field, select EmailAddress.
  4. In the Application username field, select Email.
  5. Under the the Name field, enter email.
  6. Under Value , select user.email. This maps the email field in Testim to the user.email field in Okta.
  1. Click Add Another.
  2. Repeat steps 20 – 22 for the following field combinations:
  • firstName (mapped to user.firstName)
  • lastName (mapped to user.lastName)
  • profilePicture is not mapped – this is optional.
  1. Click Next.
  2. Complete the feedback and click Finish.
  3. In the newly created application's page, scroll down to SAML Signing Certificates section.
  4. Click on Actions > View IdP metadata.
  1. Right-click and choose "Save As".
  2. Go back to the Testim tab, click the Upload File button and select the metadata.xml file that you have just saved.
  1. In the same screen, enable the Enable SSO toggle.
  1. To ensure all users are only able to login through Okta, and not through the regular Testim login page, select the Force users to login via idP checkbox.
  1. Go back to the Okta tab and associate the newly created Testim SSO connector application to the relevant Users, Groups, or Roles. In this example we will show how to add a User, but the same applies to Groups and Roles.
  2. Navigate to Applications > Applications. The new Testim SSO connector will be displayed.
  1. Click the Settings () drop-down and select Assign to Users.
  2. Assign it to the relevant user(s).
    The newly created app is created and will appear in the Okta portal of the specified users/groups/roles. From now these user(s) will be able to login to Testim from Okta SSO.