How to self-configure SSO with Okta

Simplify the sign-on process for your Enterprise team. ⚙️

Loom uses single sign-on (SSO) for Enterprise users to simplify the sign-in process and allow access to Loom using several authentication sources, including Okta. Your Workspace must be subscribed to the Enterprise plan if you wish to set up SSO.

If you're the Admin of your company's Enterprise account, you can configure SSO using the following steps:

  1. Go to your Workspace settings by clicking on Settings in the left navigation bar of your Library. Open the security tab and toggle on Single Sign On (SSO).

  1. Select Okta as your IdP for configuration. Keep this tab open, as you'll be returning to your Loom Workspace later.

  2. Open up your Okta admin portal and set up a new application using the Applications tab. Select SAML 2.0 as your sign on method. Configure your new integration by naming it Loom and adding a logo if you want.


  3. You'll also want to check the boxes to prevent displaying the app icon to users.


  4. You'll now see Okta's SAML Settings. Start with the General section below. You'll need to grab some information from Loom and input it into Okta:


    • Paste the SSO URL from Loom into the Single sign on URL field on Okta.
    • Paste the Audience URI from Loom into the Audience URI (SP Entity ID) field on Okta.
    • For Name ID format, choose EmailAddress.
    • For Application username, choose Email.
    • For Update application username on, choose Create and update.

  5. Scroll down to Attribute Statements in Okta. You'll need to map your fields:

    • For email, map to the value within your organization's Okta setup.
    • For firstName, map to the value within your organization in Okta. Note: It's important to follow the same capitalization format in your organization when you add this name.
    • For lastName, map to your organization's Okta value as well. Capitalization matters here, too.

    Loom doesn't yet support group attribute statements, so you can leave that portion blank.


  6. Hit next and fill out the final Okta form according to your own preferences. This won't impact anything in your Loom Workspace.

  7. Your application is ready! You'll now need to take some information from Okta and bring it back to your Loom portal. Start by clicking View Setup Instructions in your Sign on Methods settings.

    • Paste your IdP SSO URL under Identity Provider Single Sign-ON URL in your Loom Workspace settings where it says Single Sign-On URL.

    👉Note: Okta provides two URLs in its setup instructions. Make sure you don't accidentally copy the Identity Provider Issuer by accident.

    Upload your X.509 Certificate from your setup instructions in Okta (you'll see the option to download this) to your Loom Workspace settings.


  8. In your Loom Workspace settings, add the domains you want to authorize. You'll also need to choose destinations to send a verification email (, for example). After adding the domains, you'll see that they're listed as pending validation.
  1. Check to make sure that there are no users with outside domains already invited to your Workspace. If there are any existing members of your Workspace with domains other than, they'll be blocked from logging into Loom. Save these settings.

  2. Check the email you listed as the destination for your verification email in step 11. You should receive a message from Loom verifying the domain. After verifying the domain, you'll see that your domain is now verified in your Loom security settings and listed as an authorized domain.

  3. SSO is now turned on and can be toggled on and off by an admin. All users with your authorized domains will be required to authenticate via SSO.

  4. Add all users on your team or organization to the application in Okta. This will make it easier for Workspace members to invite their teammates. Inviting them through Loom as well will give them an email invitation to easily sign up.

    👉Note: Loom does not currently support IdP-Initiated SSO, but we recommend you bookmark the Loom application in Okta so that your team can access it from the Okta Portal. You'll also want to check the boxes to prevent displaying the app icon to users. You can do this in from Okta in the General Tab for managing the application.


Here's a video tutorial of these steps:


Questions, comments, concerns? Contact us here.   

Happy recording! 🎥 😄

0 out of 0 found this helpful