This guide walks you through configuring SAML-based Single Sign-On between Okta and BetaTesting. By the end of this process, your team members will be able to log in to BetaTesting using their Okta credentials.
Looking for SCIM provisioning too? If you also want automated user provisioning, complete this SSO guide first, then follow our Set Up SCIM with Okta guide. SCIM requires a SAML-based integration in Okta.
Prerequisites
Administrator access to your Okta admin console
An Enterprise plan on BetaTesting
Your BetaTesting account manager's contact information
Overview
The setup involves a back-and-forth exchange between you and BetaTesting:
You create a SAML app in Okta and share the metadata with BetaTesting
BetaTesting configures the connection and provides you with two values to complete the setup
You update your Okta app with those values
Both sides test the login
Step 1: Create a SAML Application in Okta
Log in to your Okta admin console
Go to Applications > Applications
Click Create App Integration
Select SAML 2.0 as the sign-in method
Click Next
General Settings
Enter an App name (e.g.,
BetaTesting SSO)Optionally upload an app logo
Click Next
SAML Settings
For the initial setup, you'll use placeholder values that BetaTesting will provide later. Enter these temporary values:
Single sign-on URL:
https://placeholder.betatesting.com(you will update this in Step 3)Check Use this for Recipient URL and Destination URL
Audience URI (SP Entity ID):
https://placeholder.betatesting.com(you will update this in Step 3)Name ID format: Unspecified
Application username: Email
Attribute Statements
Add the following attribute statements:
Name | Value |
|
|
|
|
Group Attribute Statements (for role mapping)
If you want BetaTesting to automatically assign roles based on your Okta groups:
Add a Group Attribute Statement:
Name:
groupsFilter: Matches regex
.*
This sends group memberships in the SAML assertion, allowing BetaTesting to map Okta groups to BetaTesting roles. See SSO Role Mapping & Permissions for details.
Click Next, then Finish
Step 2: Collect Your IdP Metadata
After creating the app:
On the app's Sign On tab, click View SAML setup instructions or go to the Metadata section
Collect the following three values:
IdP SSO URL (e.g.,
https://your-org.okta.com/app/xxxxx/sso/saml)IdP Issuer (e.g.,
http://www.okta.com/exkXXXXXXXX)X.509 Certificate -- download the certificate file
Send these three values to your BetaTesting account manager through a secure channel. Your account manager will provide instructions for secure transfer.
Step 3: Update Your Okta App with BetaTesting's Values
Once BetaTesting configures the connection on their side, your account manager will provide you with two values:
Assertion Consumer Service URL (also called the Single sign-on URL)
Entity ID (also called the Audience URI / SP Entity ID)
To update your Okta app:
Go back to your BetaTesting SAML app in Okta
Go to the General tab > SAML Settings > Edit
Click Next to get to the SAML configuration screen
Update:
Single sign-on URL: paste the Assertion Consumer Service URL from BetaTesting
Audience URI (SP Entity ID): paste the Entity ID from BetaTesting
Click Next, then Finish
Step 4: Assign Users
Before users can log in via SSO, they must be assigned to the app in Okta:
In your BetaTesting SAML app, go to the Assignments tab
Click Assign > Assign to People (or Assign to Groups)
Select the users or groups who should have BetaTesting access
Click Assign, then Done
Step 5: Test SSO Login
Coordinate with your BetaTesting account manager to test the connection:
Your account manager will provide you with an SSO login link specific to your organization
Open the link in a browser (use an incognito/private window for clean testing)
You should be redirected to Okta's login page
Log in with an Okta user who is assigned to the BetaTesting app
After authentication, you should be redirected back to BetaTesting and logged in
What to verify:
The user lands on the correct BetaTesting page after login
If this is a new user, their BetaTesting account was created automatically
If you configured group attribute statements, the user's role matches their Okta group membership
What BetaTesting Configures
For transparency, here's what the BetaTesting team sets up on their side during this process:
Enterprise SAML connection - Using your IdP metadata (SSO URL, certificate, issuer), BetaTesting creates an enterprise SAML connection that establishes the trust relationship
SSO connection record - Links the SAML connection to your company account, with your allowed email domain(s) and a default role
Role mappings (if requested) - Maps your Okta group names to BetaTesting roles (e.g., "Admins" group -> Company Admin role). See SSO Role Mapping & Permissions
Testing - BetaTesting verifies the connection works correctly before confirming setup is complete
Next Steps
Set up SCIM provisioning: If you want automated user provisioning, see Set Up SCIM with Okta
Configure role mappings: To map Okta groups to BetaTesting roles, see SSO Role Mapping & Permissions
Troubleshooting: If you encounter issues during setup, see SSO/SCIM FAQ & Troubleshooting
