How to set up SSO with Okta for SpringVerify
Overview
You can enable secure Single Sign On (SSO) for SpringVerify using Okta.
This guide explains how to set up SSO. SpringVerify supports both SAML and OIDC. You can choose the protocol that fits your organisation’s security policies. Most companies use SAML, but OIDC is equally supported.
How to Set Up Okta SSO for SpringVerify (SAML)
You will need:
Okta Admin Access (or your Identity Provider admin access)
Ability to create a new SAML 2.0 application in Okta
Permission to copy configuration values from Okta into SpringVerify
Step 1: Create a SAML Application in Okta
Log in to your Okta Admin Console
Go to Applications → Applications
Click Create App Integration
Choose: Sign-in method: SAML 2.0
Click Next
Enter the App Name as SpringVerify
Click Next
Step 2: Configure SAML Settings in Okta
You will now enter SpringVerify’s SAML details into Okta.
In Okta → SAML Settings:
Okta Field | What to Enter |
Single sign-on URL | |
Audience URI (SP Entity ID) | |
Name ID Format | EmailAddress |
Application Username | Email |
Add Attribute Statements
Add the following attributes exactly:
Name | Value |
email | user.email |
| user.firstName |
lastName | user.lastName |
Click Next → Finish.
Step 3: Retrieve Okta SAML Details
In the newly created SpringVerify app, open the Sign On tab and click on More details
Copy the following values:
Identity Provider Single Sign-On URL, Signing Certificate

These two values are required to configure SpringVerify.
Step 4: Configure SSO Inside SpringVerify
Select SAML as the protocol.

You now need to enter the SAML details from Okta into the SpringVerify form:
1. Entry Point (SAML SSO URL)
Paste the Identity Provider Single Sign-On URL from Okta (You can find the Identity Provider Single Sign-On URL inside your Okta App → Sign On → “View SAML setup instructions.)
2. Signing Certificate
Step 5: Assign Users in Okta
NOTE: Before adding/assigning Users in Okta, please make sure that the users with the same email address exist in your SV company as either Admins/HRs
Open the SpringVerify app in Okta
Go to the Assignments tab
Click Assign → Assign to People / Groups
Add the users or groups who should be able to log in via SSO
Step 6: Test the SSO Login Flow
Click Sign in with Custom SSO
Enter your organisation's email
You will be redirected to Okta for authentication
After login, you will be redirected back to SpringVerify
If something doesn’t work, verify:
SSO Is Now Enabled
Your team can now access SpringVerify using their company credentials through Okta.
If you need any help during the setup, the SpringVerify team is happy to assist.
Please contact - cs@springverify.com or +91 8047190155
How to Set Up Okta OIDC SSO for SpringVerify
Step 1: Create an OIDC Application in Okta
Step 3: Copy OIDC Credentials From Okta
After creating the application, copy the following:
Metadata / Discovery URL - This is also known as the OIDC Discovery Endpoint.
Client ID - A unique identifier for the application.

Client Secret - The secret key used for secure OIDC communication.
You will need to paste all three into SpringVerify.
Step 4: Enter OIDC Details into SpringVerify
You will see fields exactly like this:
Fill them as follows:
Paste the Okta OIDC Discovery URL
Example:
Client ID - Paste the Client ID from Okta.

Client Secret - Paste the Client Secret from Okta.
Click Save. SpringVerify will automatically pull:
Issuer
Authorization endpoint
Token endpoint
Userinfo endpoint
from the provided Metadata URL.
Step 5: Assign Users in Okta
Go to the SpringVerify OIDC app
Open Assignments
Click Assign → Assign to People / Assign to Groups
Add your HR team or relevant users
NOTE: Before adding/assigning Users in Okta, please make sure that the users with the same email address exist in your SV company as either Admins/HRs
Step 6: Test the SSO Login
Click Sign in with Custom SSO
Enter your work email
You should be redirected to Okta to authenticate
After login, you are redirected back to SpringVerify
If the login does not work:
- Ensure the Metadata URL is valid
- Confirm Client ID and Client Secret values
- Verify assigned users in Okta
- Confirm your redirect URL is added in Okta
You're All Set
Your SpringVerify workspace is now connected to Okta using OIDC.
Your employees can securely log in using their organisation credentials.
Related Articles
Integration of SpringVerify with Zoho Recruit
Overview: ? SpringVerify + Zoho Recruit Integration Guide SpringVerify’s integration with Zoho Recruit helps you manage employee background verifications seamlessly. Once set up, you can initiate verifications directly from Zoho Recruit, with ...
SpringVerify India - APIs Documentation
Introduction Welcome to SpringVerify India API Documentation. The endpoints exposed in this documentation are to initiate background verification of a candidate and query the verification report. The SpringVerify India API is organized around REST. ...
Integration of Greenhouse with SpringVerify
Overview: ? SpringVerify + Greenhouse Integration Guide SpringVerify’s integration with Greenhouse makes it easy to initiate and automate background verification checks. Once connected, you can trigger verifications automatically at critical hiring ...
How to generate an API key on SpringVerify portal?
Steps to generate API token on SpringVerify 1. Log into your SpringVerify account with your login credentials 2. Go to Profile (top right corner) 3. Click Setting from the Dropdown 4. Navigate to API section 5. In this section, click on Generate ...
Integration of SpringVerify with Zenefits
SpringVerify – Zenefits Integration Overview SpringVerify IN integrates seamlessly with Zenefits, allowing clients to connect using their Zenefits API key. This integration enables HR teams to: Automate background verification (BGV) directly within ...