How to Set Up Okta SSO for Jotform Enterprise

August 2, 2025

With Jotform Enterprise, you can connect Okta’s Single Sign-On to your forms in just a few steps. To get started, make sure SSO’s enabled on your Jotform Enterprise server and that you have an Okta admin account. Once it’s set up, your team can log in quickly and securely using Okta.


Notes

  • When SAML is enabled, the app’s regular sign-in page is disabled—users can only log in through Okta.
  • Jotform Enterprise doesn’t support backup sign-in URLs, so users can’t use their standard username and password. If needed, you can reach out to Jotform Enterprise Support to turn off SAML.
  • The Jotform Enterprise SAML integration currently supports SP-initiated SSO, IdP-initiated SSO, and Just-in-Time (JIT) provisioning.

Setting Up the Okta SAML App

Before setting up Okta SSO in your Jotform Enterprise account, you’ll need to create a SAML App in your Okta Admin Dashboard. It’s easier than you think—here’s what to do:

  1. Log in to your Okta Admin account and click on Admin on the top-right side of the page.
Click Admin at the top-right of your Okta dashboard
  1. Now, on the left side of your Getting Started page, click on the Rightward Arrow icon to open the Navigation menu.
Click the Rightward Arrow icon on the left side to open the navigation menu in your Okta dashboard
  1. Then, in the Navigation menu that comes up, click on Applications, and in the Submenu that comes up, click on Applications again to continue.
Click Applications in the Okta menu, then click Applications again in the submenu to continue
  1. Next, click on Create App Integration.
Click Create App Integration to start setting up SSO
  1. Then, in the Create App Integration window that comes up, select SAML 2.0 and click on Next.
Choose SAML 2
  1. Now, on the Create SAML Integration page, under the General tab, set up these things:
    • App Name — Enter a name for your app so users can recognize it easily.
    • App Logo — Upload a logo that users will see during login.
    • App Visibility — Check the box to show the app on the User Dashboard, or leave it unchecked to hide it.
  2. Then, click on Next.
Fill in the App Name, upload a Logo, choose visibility settings, then click Next to continue setting up SAML SSO
  1. Now, under the Configure SAML tab, fill in these details. Take a look at our guide on How to Obtain Service Provider Metadata from Jotform Enterprise to learn more about them.
    • Single Sign on URL — Enter your full Assertion Consumer Service URL. For example: https://example.jotform.com/sso/?acs
    • Audience URI (SP Entity ID) — Enter your Jotform Entity ID. For example: https://example.jotform.com/sso/metadata.php
  2. Then, click on Show Advanced Settings.
Add your Jotform SSO URL and Entity ID, then click Show Advanced Settings in Configure SAML tab of Okta
  1. Next, in the Signature Certificate field, click on Browse files to upload your SPM Certificate
Upload your Signature Certificate for Jotform SSO by clicking Browse files
  1. Once the SPM certificate’s uploaded, check the box next to Enable Single Logout to allow the application to initiate single logout.
  2. Then, enter this info:
    • Single Logut URL — Enter your full Assertion Consumer Service URL replacing ?acs with ?slo. For example: https://example.jotform.com/sso/?slo
    • SP Issuer — Enter your Jotform Entity ID. For example: https://example.jotform.com/sso/metadata.php
Enable Single Logout in Okta SAML setup and enter your SLO URL and SP Issuer from Jotform
  1. Now, scroll down to the bottom of the page and click on Next.
Click Next at the bottom of the Configure SAML settings page in Okta
  1. Then, under the Feedback tab, click on Finish.
Click Finish under the Feedback tab to complete your SAML app setup in Okta.
  1. After that, you’ll be redirected to the Sign On tab. In the bottom-right corner of the page, click on View SAML Setup Instructions, and you’re all set.
Click View SAML Setup Instructions in the bottom-right corner of the Sign On tab to get your SAML details.

Now, you’ll be able to view your SAML App details. You’ll need this information to set up SSO in your Jotform Enterprise account.

The SAML Setup Instructions page shows the SSO URL, Entity ID, and Certificate needed to set up SSO in Jotform Enterprise

Enabling and Configuring Okta SSO in Your Jotform Enterprise Server

Now that you’ve got your Okta SAML details ready, log in to your Jotform Enterprise server to set up the SSO connection. It only takes a minute—here’s how:

  1. On your My Workspace page, click on your Avatar/Profile picture in the top-right corner of the screen.
  2. Then, in the Dropdown menu that comes up, click on Admin Console to open your Admin Dashboard page.
Click your profile picture on My Workspace to open the Admin Console in Jotform
  1. Click on the Settings in the menu on the left to open your Settings Dashboard.
  2. Scroll down to the SSO Settings section and toggle on Single Sign-On.
  3. Then, in the Provider Name field, enter the name you want users to see on the login page.
Go to Settings from the left menu, scroll to SSO Settings, turn on Single Sign-On, and enter your provider name in Jotform.
  1. Now, in the Identity Provider Metadatasection fill in these details:
    • Entity ID — Enter your Okta Issuer URL.
    • SSO URL — Enter your Okta SAML 2.0 Endpoint (HTTP).
    • Certificate — Paste your Okta X.509 Certificate.
    • SLO URL — Enter your Okta Identity Provider Single Logout URL.
Enter your Okta Issuer URL, SSO URL, X.509 Certificate, and Single Logout URL under Identity Provider Metadata in Jotform.
  1. Finally, click on Test Connection to make sure everything’s working correctly. If it’s successful, click on Save to apply your SSO settings—and you’re good to go.
Click Test Connection to check your Okta SSO setup, then click Save if the test is successful in Jotform.

Once you’ve turned on SSO, you’ll see these extra options under the SSO settings:

  • Allow Email Login for Licensed Users — This lets licensed users log in with their email and password too, not just through SSO.
  • Require Single Sign-On for Guest Accounts — This makes sure guest users can only sign in through SSO, adding a bit more security.
  • SSO SCIM Provisioning Settings — This helps you automatically manage users by syncing with your identity provider, so you don’t have to update things manually.
Additional SSO settings like Email Login, Guest Account restrictions, and SCIM provisioning options in Jotform.

Notes

  • Jotform Enterprise supports SAML attributes like email (user.email), name (user.name), and surname (user.surname). You can add and manage additional attributes in the Jotform Enterprise Admin Dashboard.
  • Users can log in with either SSO or their email and password. You can also choose to require SSO for guest users.
Jotform Gmail Agent
Contact Support

Our customer support team is available 24/7 and our average response time is between one to two hours.

Send Comment:

Jotform Avatar
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Podo Comment Be the first to comment.