See these official instructions for reference.
In the Admin Console, go to Applications > Applications.
Click Create App Integration.
Select SAML 2.0 as the Sign-in method.
Click Next.
Provide the general information for the integration and then click Next.
Provide the necessary SAML settings information for your integration:
Field | Value |
---|---|
Single sign-on URL | Sandbox: https://sandbox-temp-url.auth.eu-central-1.amazoncognito.com/saml2/idpresponse |
Production: https://production-temp-url.auth.eu-central-1.amazoncognito.com/saml2/idpresponse
|
| Audience URI (SP Entity ID) | Sandbox: urn:amazon:cognito:sp:eu-central-1_T7VmNf7NL
Production: urn:amazon:cognito:sp:eu-central-1_kQEOSHc18
|
| Default RelayState | Leave empty |
| Name ID format | Keep default |
| Application username format | TranslationOS SSO requires a value equivalent to the user’s email address, as the domain is used to identify users. |
| Update application username on | Keep default |
Populate the attribute statements as follows:
Name | Name format | Value |
---|---|---|
Unspecified | user.email | |
givenname | Unspecified | user.firstName |
lastname | Unspecified | user.lastName |
name | Unspecified | user.displayName |
Click Next.
Provide configuration information about your app integration to Okta.
After you create your SAML app integration, the SAML Signing Certificates section appears on the Sign On tab. Switch to the Sign On tab and navigate to the SAML Signing Certificates section.
Click the Actions drop-down alongside the relevant certificate.
Choose View IdP metadata.
Copy the metadata URL.
Send the following to Translated:
We will do some configuration on our end, then let you know when you can continue.