SSO: Setting up Okta and SAML 2.0 with WorkTango

  • Updated


To use Okta to log in to WorkTango, you will need the following components:

  • A WorkTango subdomain
  • Okta Single Sign-On Service enabled
  • Your Okta SSO subject matter expert

If users will be accessing mobile app, please ensure that configuration allows access to SSO connections outside of the company’s network.

In order to properly set up Okta, you will need to know how to create your own app within your company’s application directory.

Setup Steps

Create your own app within your company’s directory:

1) Log in as an Okta admin and choose “Add Applications” at the top right of the dashboard.

Clicking on the “Applications” header then “Add Applications” will also allow the user to add an application

okta 1.png

2) Click on the “Create New App” button under the search bar to the left of the page and choose SAML 2.0 for the setup process.

Okta 3.png

3) Fill in the App name and add a logo (if available) and click Next

4) Now the SAML information will need to be added. The “General” section of this page is required for SAML applications.


  • Single sign-on URL - Company Okta sign on url - normally formatted: https://<subdomain>
  • Audience URI (SP Entity ID) - WorkTango subdomain formatted: <subdomain>

    Do not include https:// or http:// as login attempts will throw errors

  • Default RelayState - Leave blank unless your company has a specific application resource for IDP SSO login.
  • Name ID format - Leave Unspecified unless otherwise instructed.
  • Application username - Defaults to Okta username - Must be customized if using EmployeeId instead of username or Email.

Okta 3.png

Additionally, there are advanced settings which are optional and available if explicit instructions are given to change them. (defaults are pictured below)

Okta 4.png

5) Once the all information is entered, click the “Preview SAML Assertion” button under section B. If a new page loads with an xml file with all the information filled out on the previous page, then go back to the page and click Next at the bottom right. If you receive an error, please correct the error on the previous page and repeat this process until the xml page loads with the correct information.

6) Click Next and reply appropriately. This page is required so that the Okta team can properly add the app to the correct part of the directory (Okta created apps or user created apps).

7) Click Finish and the app is now set up.

8) Admin will need to navigate to the app from the directory and click the “Assign” button to allow users access. Users may be added by group or individually.

Okta 5.png

Important Final Step

Now that the app is in your company directory, click on “Applications” page and click on the WorkTango app within the app list. Once there, click “Sign On” and please provide the Identity Provider metadata to your WorkTango Customer Success launch representative.

Okta 6.png

As soon as the file is provided, we can update the platform to allow for Okta SSO.

*The documentation provided above is only applicable to the WorkTango Recognition & Rewards platform and does not apply to our Surveys & Insights solution.

Related to

Was this article helpful?

0 out of 0 found this helpful

Have more questions? Submit a request



Article is closed for comments.