Streamline Your On-Call Access: Configuring Okta SSO for PagerDuty
By integrating Okta Single Sign-On (SSO) with PagerDuty, teams can securely access critical alerting and response workflows with one trusted identity.
To setup Okta SAML for Pager duty you follow the next steps:
- Add PagerDuty as a new SAML 2.0 application in Okta.
- Configure the SSO URL and Audience URI (Entity ID) provided by PagerDuty.
- Assign your on-call and admin groups directly from Okta.
- Test the connection and enforce SSO for all users.
Here are a few screenshots to give you a quick look at the configuration in action.
1. Log int to the Okta tenant > Application > Add Integration, select PagerDuty

2. Complete the Base URL the correspond your PagerDuty instance

3. View Setup Instructions for the configuration details

4. Okta will redirect to a page with the configuration details like the X.509 certificate, login url,etc.

6. Go to PagerDuty instance and enable the SAML configuration.

7. In your Okta tenant, select a user in Okta and assign the PagerDuty application.

8. Access your PagerDuty instance and a login page will be displayed. Click Sign In with Single Sign-On button.

9. PagerDuty will redirect the user to the Okta login page. Complete your authentication credentials process.

10. If authentication successfully verified by Okta, the user will be redirected to the PagerDuty portal

11. If user do not exist in PagerDuty, you will see a message Unable to find user. You will need to enable the provision capabilities in both systems.

