Cognism Okta setup: configure SSO and provisioning to manage user permissions across Cognism integrations securely.
How to set up Okta integrations with Cognism: this guide shows how to integrate Cognism and Okta using SSO and SCIM provisioning.
By enabling Cognism SSO and automated user management, you can manage user permissions across Cognism integrations more securely and efficiently.
Set up Okta SAML SSO and SCIM provisioning for Cognism
Here’s how to configure Single Sign-On (SSO) and user provisioning (SCIM) between Okta and Cognism.
Once configured, users can log in to Cognism via Okta SSO, and admins can automatically manage users via SCIM.
Prerequisites
Before you begin, make sure:
- You are an Okta admin
- You are an admin in Cognism
If you do not have the required access, contact Cognism Support.
Add the Cognism app in Okta
- Log in to your Okta Admin Console.
- Go to Applications > Applications.
- Select Add application or Create new app.
- In the App Integration Catalogue, search for Cognism.
- Select Cognism > Add integration.
You can create a second Cognism app for SP-initiated SSO only.
If you do this, select Do not display application icon to users to hide it from user dashboards
Set up Okta SSO
Configure SSO in Okta
- Open the Cognism app in your Okta Admin Console.
- Go to the Sign On tab.
- Enter the following Default Relay State value:
PUKgc1bMxqQDKulHYsQy
- Select Save.
- Select View SAML setup instructions.
- Copy the following values:
- Identity Provider Single Sign-On URL
- X.509 Certificate
Configure SSO in Cognism
- Go to Settings in the left-hand side bar.
- Select Single sign-on.
- Select Configure next to Okta.
- Paste the Identity Provider SSO URL and X.509 Certificate from Okta.
- Do not include
-----BEGIN CERTIFICATE----- or
-----END CERTIFICATE-----
- Select Configure.
Once enabled, users assigned to the Cognism app in Okta can log in using IdP-initiated SSO from their Okta dashboard.
Important SSO behaviour
- When Okta SSO is enabled, users must log in via Okta
- Selecting the SSO button on app.cognism.com will return an error
Enable SP-initiated SSO (optional)
To allow login from the Cognism login page:
- Create a second Cognism app in Okta.
- Configure it using Custom SSO instructions.
- Hide the app from the Okta user dashboard to avoid duplication.
Set up Okta SCIM provisioning
Generate an API token in Cognism
- In Cognism, go to Settings in the left-hand side bar > Tokens / API.
- If you do not see this tab, contact support@cognism.com
- Select Create new token.
- The token is valid for six months or until your contract ends, whichever comes first.
- Copy and securely store the token. You cannot retrieve it again later.
Configure SCIM in Okta
Set application username format
- In Okta, open the Cognism app.
- Go to Sign On.
- Under Credential details, set Application username format to Email.
Enable API integration
- Go to Provisioning > Configure API integration > Enable API integration.
- Paste the Cognism API token.
- Select Test API credentials > If successful Save.
Enable provisioning actions
- Under Provisioning > To App > Edit.
- Enable:
- Create users
- Update user attributes
- Deactivate users
- Select Save.
Assign users
- Go to the Assignments tab.
- Assign users to the Cognism app.
Assigned users are provisioned automatically based on your SCIM settings.
Important SCIM behaviour
- Changing a user’s email address in Okta does not update it in Cognism
- Email is the unique identifier
- A new Cognism user is created if licences are available
- Deactivated users in Okta remain in Cognism as inactive users
- Users provisioned via Okta:
- Do not receive Cognism welcome emails
- Do not set passwords in Cognism
- Authenticate only through SSO
Expected results
After setup:
- Users log in to Cognism using Okta SSO
- User creation and deactivation are managed through Okta
- No manual user invites or password management are required
Next steps
- Assign users to the Cognism app in Okta
- Test SSO and SCIM with a pilot user
- Review inactive users and license usage in Cognism
Comments
Please sign in to leave a comment.