This article explains setting up your Okta SSO provider with Expel Workbench

  1. Log into your Okta console.

  2. Navigate to Applications in the main top navigation.

  3. Click Add Application > Create New App.

  4. The settings should be as follows:

    • Platform: Web.

    • Sign on method: SAML 2.0.

    • Click Create.


      This screen can look slightly different depending on your Okta account.

  5. Under General Settings:

    • App name: Expel Workbench.

    You are now on the Configure SAML step in Okta. Copy information from Expel Workbench to complete the integration.

  6. Open a new tab or window and log in to Expel Workbench (

  7. Navigate to Organization Settings > My Organization and select the organization.

  8. On the Integrations tab, click Single Sign-on > Configure SSO.

  9. Copy and paste the following from Expel Workbench into Okta:

    • ACS URL or Single Sign-on URL → Single sign on URL

    • Audience URI or Audience → Audience URI (SP Entity ID)

    • Leave Yes, allow users to log in locally OR via SSO selected for local logins. This selection makes initial SSO setup easier. You can change this later.

  10. In Okta, in (A) SAML Settings, under Attribute Statements (Optional):

    • Type the word email under Name, and select from the Value list.


      These fields are case sensitive.

  11. For the Okta feedback form, do one of the following:

    • Select I’m an Okta customer adding an internal app and fill in the following optional information as you see fit.

    • Select This is an internal app that we have created.

  12. Click Finish.

  13. In Okta under Sign On, click Settings > View Setup Instructions.

  14. In Expel Workbench, click Next two times, until you see Step 3 of 3.

  15. Copy and paste the following from Okta into Expel Workbench.

    • Identity Provider Single-Sign-On URL → Single Sign-On URL or SAML 2.0 Endpoint

    • Identity Provider Issuer → Issuer or Issuer ID

    • X.509 Certificate → Certificate

  16. Click Save in Expel Workbench.