Configure Procore for IdP-Initated Okta SSO

 Note

If your organization is using the Portfolio Financials and Capital Planning products in Procore, you will need to reach out to your Procore point of contact or the Support team to set up your Okta SSO.

Objective

 To configure IdP-initiated SSO for Okta (SAML 2.0).

Background

If your company wants to configure Single Sign-On with Okta, you can leverage one of Procore's supported SSO solutions:

Things to Consider

 Optional - Unique Entity ID

When configuring SSO for a single Procore instance, you should NOT check this box.

If your company licenses more than one Procore instance, and you want to configure unique Procore enterprise applications within your IdP tenant for each instance, you can by enabling Unique Entity ID. If enabled, you are still limited to one (1) enterprise application per Procore company instance.

Important: SSO for Procore targets users by email domain. An email domain can only be targeted once in all of Procore, so if you're considering setting up SSO with Unique Entity IDs across multiple Procore instances, remember that you can only target an email domain once, in a single instance.

To generate a Unique Entity ID for an enterprise application, check the Enable Unique Entity ID box in the Procore Admin tool's SSO configuration page for the Procore instance you want to specify on an enterprise application. Checking this box will generate a unique Entity ID URL in the field below, which you will then copy and paste into the appropriate Entity ID field in your IdP's configuration page.

Notes: You must save your configuration with the box checked to generate the Unique Entity ID. Enabling this feature does not impact user membership or access to a given instance. Access to a company in Procore is determined by a user's presence in the Directory tool, and their configured permissions within Procore. Auto-provisioning with SSO is not supported at this time.

sso-unique-entity-id.png

 

Steps

Step 1: Add the Procore Application to Okta

  1. Log in to Okta as an Administrator. 
  2. Click Admin

    okta-click-admin.png
     
  3. Choose Applications > Applications.

    okta-apps-apps.png
     
  4. Click Add Application.

    okta-add-app.png

     
  5. In the Search for an Application box, search for Procore. When Procore's Okta-Verified SAML app appears, click Add.

    okta-search-for-procore.png
     
  6. Under General Settings, do the following:
    • Application Label. Type a name for the new application. For example, type: Procore
    • Application Visibility. Leave both of these checkboxes blank. This will allow the Procore icon to appear in Okta and on the Okta login page. If you place a checkmark in this box, the logo with NOT appear. 
    • Browser Plugin Auto-Submit. Ensure a checkmark appears in this box. 

      okta-applicaton-label.png
  7. Click Next

    okta-sign-on-options.png
     
  8. Click View Setup Instructions.
    This opens the Setup SSO page in a new web browser tab. Leave this page open in your browser. Later, you will need to copy information in this page when you configure the Okta SSO settings in the Procore web application.
    Important!  When copying the X.509 Certificate string, do NOT copy the "------------BEGIN CERTIFICATE------------" and "------------END CERTIFICATE------------" markers. Only copy the text that resides between these markers. 
    okta-copy-certificate.png
  9. Return to your open browser tab with Okta's Sign On page, as shown below. Then ensure that Okta Username is selected in the Application Username Format list.

    okta-sign-on-options.png
     
  10. Click Next.
  11. Place a checkmark next to the name of your organization's Procore users in the People list. 

    okta-assign-procore-to-people.png
     
  12. Click Next.
  13. Verify that the attribute settings are correct for all of your Procore users. This Otka username is an email address. This is the address that you Procore users will use to log in to your Procore + Okta SSO Integration.

    okta-end-user-attributes.png
     
  14. Click Done.
  15. Continue with the next procedure.

Step 2: Configure the Okta Settings in Procore

  1. Login into the Procore web application.  
    Note: You must log in using an account that has 'Admin' permission to the company's Admin tool. 

  2. Navigate to the company's Admin tool.
  3. Under Administrative Settings, click Single Sign On Configuration.
  4. Enter the following information:
    • Single Sign On Issuer URL
      Paste the 'Identity Provider Single Sign-On URL' that you copied from Okta into this field.
    • Single Sign On Target URL.
      Leave this field blank.
    • Single Sign On x509
      Paste the 'X509 Certificate' that you copied from Okta into this field. 
      Important: When copying the certificate information from Okta, do NOT copy the "------------BEGIN CERTIFICATE------------" and "------------END CERTIFICATE------------" markers. You only want to copy the text that resides between these markers. 

      okta-sso-idp-configuration-settings.png
       
  5. Click Save Changes.
  6. Next, reach out to your company's Procore point of contact or contact Procore Support to request that they enter the domains you want to target for authentication via SSO. Procore must enter these domains on your behalf. 
  7. Once the domain(s) have been entered by Procore, take the final steps to enable SSO for your company:
    1. Mark the Enable Single Sign On box in Procore's SSO configuration settings.
    2. Select Allow Password Login to enable an IdP-initiated flow.
    3. Click Save.

Authentication via the configured SSO method will become active immediately after saving the final completed configuration. 

 Note
Customers who license Procore Pay may require additional support enabling MFA for Payments when SSO is configured for their company. If you license Procore Pay and want to enable SSO, contact Procore support

See Also