Set up SSO with Okta


Talk to your Kizen account manager about enabling SAML SSO in your Kizen business. To use Okta as your SSO provider, you’ll need a separate license agreement with Okta, and the users who you want to have Kizen access should be provisioned in Okta.

Supported features

  • IdP-initiated SSO
  • SP-initiated SSO

Configuration steps 

Once the Kizen connector is installed into your Okta instance and your users are granted access, the Kizen Customer Success team can take care of the rest of the configuration. We’ll initially set your connector in Testing mode, where both SSO and your existing username/password login will work in parallel. Once your testing is complete, we’ll toggle the connector to Live mode, and all your users will be forced to use the Okta service. Newly invited users will not be required to create a password.

Note: In live mode, Kizen doesn't provide a backup sign-in URL where users can sign in using their regular username and password. Contact Kizen Support ( to disable SAML Live mode if necessary.

Detailed steps 

  1. Copy the Metadata URL from the Okta Admin Console, in the SAML 2.0 Sign on methods section.
  2. Contact the Kizen customer success team ( and request that they enable SAML 2.0 for your business. Include the "Metadata URL" value from the previous step.
  3. Your SAML configuration for Kizen is complete. You can start assigning people to the application.

SP-initiated SSO

In addition to logging into Kizen from your Okta application dashboard, your users can log into Kizen by going directly to or clicking on links from emails from Kizen.

  1. From your browser, navigate to the Kizen sign-in page.
  2. Enter your Okta credentials (your email and password) and click "Sign in with Okta".

If your credentials are valid, you are redirected to the Kizen application.


Contact Kizen Customer Success ( with any SSO issues or questions.

Was this article helpful?
0 out of 0 found this helpful