Configure Single Sign-On for Okta in CloudCheckr

In this topic, you will learn how to set up SSO with your Okta account by configuring:

  • Okta (the Identity Provider or IdP)
  • CloudCheckr (the Service Provider or SP)


In the steps that prompt you for the app name, replace the default with:
  • if you are a customer based in Europe
  • if you are a customer based in Asia or Australia
  • if you are a GovCloud customer
  • if you are a High-Security customer
  1. In your Administration console, go to Applications tab, and click Create New App.
  2. Select the SAML 2.0 option.
  3. Under General Settings, go to the App name text field and type CloudCheckr
  4. Configure the following SAML settings:
    1. Single Sign-On URL:
      • For iDP-initiated SSO, type if you are in the US
      • For SP-initiated SSO, type
    2. Recipient URL and Destination URL: Yes
    3. Audience URI (SP Entity ID):
      • For iDP-initiated SSO, type
      • For SP-initiated SSO, type https://mycompanyscloud.mycompany.coms
    4. Name ID format: EmailAddress
    5. Default username: Email
    6. Response: Signed
    7. Assertion: Signed
    8. Authentication context class: X.509 Certificate
    9. Request compression: Compressed
  5. On the Sign On tab of the new application, click the Identity Provider metadata link to download an XML file that contains the metadata from Okta that CloudCheckr requires to complete the setup.
  6. On the People tab, click the Assign Application button to select the link that users will see when they log onto CloudCheckr.
    Email addresses as SSO usernames are required, so if your users do not have email, you must provide an email address.

Configure in CloudCheckr

Please email support to ensure your CloudCheckr account is properly configured to allow access via Okta.

How did we do?