Okta

Configure SSO on CoreWeave with Okta

To configure CoreWeave SSO using Okta as your identity provider, first create a new SSO configuration on CoreWeave.

On the configuration screen, select Okta from the Your IDP drop-down menu.

Note

It's recommended to keep the CoreWeave Cloud window open so that you may reference the values provided by CoreWeave during this configuration.

Configure Okta

Navigate to the Okta Admin Console to create a SAML app integration to begin configuring Okta's side of the SSO connection.

General settings

From the SAML integration screen, enter an application name (such as CoreWeave Cloud). Optionally, add an app logo to display in the Okta application menu. Then, click Next.

Additional Resources

For more information on Okta's SAML integration fields, refer to Okta's Application Integration Wizard SAML field reference.

Configure SAML

On the following menu, Configure SAML, enter the Single sign-on URL provided in the CoreWeave SSO configuration panel.

Note

What Okta calls the Single-sign on URL is the same as the Assertion Consumer Service (ACS) URL provided in the CoreWeave SSO configuration panel.

Check the box beside "Use this for the Recipient URL and the Destination URL."

The general configuration fields should be set to the following values:

FieldValue

Single sign-on URL

Provided by CoreWeave. (See: Configure the IDP)

Audience URI (SP Entity ID)

Provided by CoreWeave. (See: Configure the IDP)

Name ID format

Unspecified

Application username

Okta username

Update applicaton username on

Create and update

Attribute statements

Next, on the same page, configure the Attribute Statements for the SAML integration. The attribute statements fields should be set to the following:

NameName formatValue

first_name

Unspecified

user.firstName

last_name

Unspecified

user.lastName

email

Unspecified

user.email

login

Unspecified

user.login

Note

The email attribute is what uniquely identifies users.

Identity provider URL, issuer, and X.509 certificate

To acquire the identity provider URL, the IDP Single sign-on URL, and the X.509 certificate, click the View SAML setup instructions button on the right-hand side of the "Configure SAML" page.

This will redirect to a "How to" page, which contains all values for these fields.

The provided values in these fields must be added to their associated fields in the CoreWeave SSO configuration menu.

Feedback

The final portion of the Okta SAML integration is a feedback form for Okta, and may be filled out as you wish - this feedback is used by Okta. Once this section is complete, click Finish.

Configure CoreWeave SSO

If not already complete, return to the CoreWeave SSO configuration menu to finish setting up and enabling the SSO configuration.

Last updated