You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Implement the Okta SAML metadata URL submission path in the Configure step of `<__experimental_ConfigureSSO />`. Adds a single text input for the IdP metadata URL; Continue posts `{ saml: { idpMetadataUrl } }` via `user.updateEnterpriseConnection` wrapped in `useReverification`, with `useCardState` driving the loading state and `handleError` routing backend errors inline to the field or to the card-level error surface. Locale keys added under `configureSSO.configureStep` in `en-US`. Manual entry, file upload, SP-side copy rows, and the Okta admin-console walkthrough ship in follow-up PRs.
Fix `toMeEnterpriseConnectionBody` to produce the flat snake_case body shape the backend expects for `user.createEnterpriseConnection` and `user.updateEnterpriseConnection`. SAML and OIDC fields are now top-level prefixed (e.g., `saml_idp_metadata_url`) rather than nested under `saml` / `oidc` objects. Without this fix, IdP metadata submission in `<__experimental_ConfigureSSO />` silently fails on the backend.
subtitle: "Contact the application's administrator to get access through the existing connection.",
248
248
},
249
249
},
250
+
configureStep: {
251
+
spFields: {
252
+
acsUrl: {
253
+
label: 'Single sign-on URL',
254
+
},
255
+
spEntityId: {
256
+
label: 'Audience URI',
257
+
},
258
+
},
259
+
attributeMapping: {
260
+
title: 'We expect your SAML responses to have the following specific attributes:',
261
+
paragraph:
262
+
"These are the defaults and probably won't need you to change them. However, many SAML configuration errors are due to incorrect attribute mappings, so it's worth double-checking. Here's how:",
263
+
columns: {
264
+
attribute: 'Attribute',
265
+
claimName: 'Claim Name',
266
+
},
267
+
badges: {
268
+
required: 'Required',
269
+
optional: 'Optional',
270
+
},
271
+
rows: {
272
+
email: {
273
+
attribute: 'Email address',
274
+
claim: 'user.email',
275
+
},
276
+
firstName: {
277
+
attribute: 'First Name',
278
+
claim: 'user.firstName',
279
+
},
280
+
lastName: {
281
+
attribute: 'Last Name',
282
+
claim: 'user.lastName',
283
+
},
284
+
},
285
+
},
286
+
samlOkta: {
287
+
title: 'Configure Okta Workforce',
288
+
subtitle: 'Create a new enterprise application in your Okta Dashboard',
289
+
createApp: {
290
+
title: 'Create a new enterprise application in Okta',
291
+
step1: 'Sign in to Okta and go to Admin → Applications.',
292
+
step2: 'Click Create App Integration.',
293
+
step3: 'Select SAML 2.0.',
294
+
step4: 'Fill in the General Settings (App name is required).',
295
+
step5: 'Click Next to complete creating the application.',
296
+
},
297
+
serviceProvider: {
298
+
title: 'Configure service provider',
299
+
paragraph1:
300
+
'Once you have moved forward from the General Settings instructions, you will be presented with the Configure SAML page.',
301
+
paragraph2:
302
+
'To configure your service provider (Clerk), you must add these two fields to your Okta application:',
303
+
},
304
+
completeSamlIntegration: {
305
+
title: 'Complete SAML integration',
306
+
step1: 'Select This is an internal app that we have created from the options menu.',
307
+
step2: 'Complete the form with any comments and select "Finish".',
308
+
},
309
+
configureAttributes: {
310
+
step1: 'In the Okta dashboard, find the Attribute Statements section.',
311
+
step2: 'Select Add Expression for each attribute, and enter the following name and expression pairs:',
312
+
pairs: {
313
+
conjunction: ' and ',
314
+
email: {
315
+
name: 'mail',
316
+
expression: 'user.profile.mail',
317
+
},
318
+
firstName: {
319
+
name: 'firstName',
320
+
expression: 'user.profile.firstName',
321
+
},
322
+
lastName: {
323
+
name: 'lastName',
324
+
expression: 'user.profile.lastName',
325
+
},
326
+
},
327
+
},
328
+
assignUsers: {
329
+
title: 'Assign selected user or group in Okta',
330
+
paragraph: 'You need to assign users or groups to your enterprise app before they can use it to sign in.',
331
+
step1: 'In the Okta dashboard, select the Assignments tab.',
332
+
step2: 'Select the Assign dropdown. You can either select Assign to people or Assign to groups.',
333
+
step3: 'In the search field, enter the user or group of users that you want to assign to the application.',
334
+
step4: 'Select the Assign button next to the user or group that you want to assign.',
335
+
step5: 'Select the Done button to complete the assignment.',
336
+
},
337
+
metadataUrl: {
338
+
label: 'Metadata URL',
339
+
placeholder: 'Paste URL here...',
340
+
description: 'In your Okta SAML app, go to the Sign On tab and retrieve the metadata URL. Paste it below.',
0 commit comments