Empuls supports SAML 2.0-based Single Sign-On through Okta, enabling employees to authenticate using their corporate Okta credentials. Once configured, Okta controls who can access Empuls — users gain or lose access automatically based on their Okta assignments, and no passwords are stored in Empuls.Documentation Index
Fetch the complete documentation index at: https://empuls.mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
How it works
With SAML 2.0, Okta acts as the Identity Provider (IdP) and Empuls acts as the Service Provider (SP). The authentication sequence is:- The user enters their email on the Empuls login page and clicks Proceed.
- Empuls redirects the user to Okta.
- Okta verifies the user’s credentials.
- Okta sends a signed SAML response back to Empuls.
- Empuls grants the user access.
Prerequisites
- Admin access to the Okta Admin Console
- Super Admin access to Empuls
- Your Empuls tenant URL
Step A: Get Empuls SP metadata from Empuls
Open Empuls authentication settings
Log in to Empuls. Navigate to Reports & Settings → Admin Dashboard → User Authentication → Custom Login SAML 2.0 SSO.
Copy or download SP details
From the SAML 2.0 configuration page, copy the following values — you will enter them in Okta:
- ACS URL (Assertion Consumer Service URL)
- Entity ID (Audience URI)
- Name ID format
empuls-sp-metadata.xml. You can upload this file directly in Okta.Step B: Create the Empuls app in Okta
Open Okta Admin Console
Log in to the Okta Admin Console. Go to Applications → Create App Integration.
Configure SAML settings
In the SAML Settings screen, enter the following:
| Okta field | Value |
|---|---|
| Single Sign-On URL | Empuls ACS URL |
| Audience URI (Entity ID) | Empuls Entity ID |
| Name ID Format | EmailAddress |
| Name ID Value | Email or Employee ID (must match user records in Empuls) |
Step C: Assign users in Okta
Step D: Export Okta metadata and upload to Empuls
Download Okta IdP metadata
In the Okta Admin Console, go to Applications → Empuls → Sign On tab. Click View SAML setup instructions and download the IdP Metadata XML file.
Upload to Empuls
Return to Empuls. Go to User Authentication → SAML 2.0 (at
/home/integrations/saml_sso). In the Identity Provider metadata section, upload the Okta IdP metadata XML file.Step E: Test the connection
Step F: Set Okta SSO as the default login method
To make Okta SSO the default for all users, go to Admin Dashboard → User Authentication → Custom Login Method → SAML 2.0 (Okta) and set it as the default login method.Other SAML 2.0 providers
The same general process applies to other SAML 2.0-compatible identity providers. The key steps are always: obtain Empuls SP metadata → configure the IdP app → download IdP metadata → upload to Empuls → test the connection.- OneLogin
- Ping Identity
In OneLogin, create a SAML Test Connector (Advanced) application. In the Configuration tab, enter the Empuls ACS URL and Entity ID (or upload
empuls-sp-metadata.xml for auto-mapping). Set the NameID Format to Email or Unspecified with Employee ID. Download the OneLogin IdP metadata XML from Applications → Your App → SSO → Download Metadata and upload it to Empuls at /home/integrations/saml_sso. Click Test Connection to verify.Troubleshooting
Test connection fails
Test connection fails
- Confirm the Name ID in Okta is set to Email or Employee ID.
- Verify the ACS URL and Entity ID in Okta exactly match the values from Empuls — extra spaces or trailing slashes can cause failures.
- If you recently updated your Okta configuration, re-download and re-upload the Okta IdP metadata in Empuls.
User is assigned in Okta but cannot log in to Empuls
User is assigned in Okta but cannot log in to Empuls
- Confirm the user exists in Empuls (check Admin → Manage Employees).
- Verify the email address or employee ID in the user’s Okta profile exactly matches their record in Empuls.
Pop-up is blocked during testing
Pop-up is blocked during testing
Allow pop-ups for your Empuls domain in your browser settings and retry.
Can I enable two custom SSO options simultaneously?
Can I enable two custom SSO options simultaneously?
Contact cs@xoxoday.com to enable multiple custom SSO providers for your organization.