Sign in to Okta and open your application. Navigate to the SAML Settings page for your application. In the Group Attribute Statements (optional) section, configure like the following: Name: groups Name format: Unspecified Filter: Starts with + organization: where organization is the name of your...
2. The custom group attribute configured inOkta - SAML Config Part #1which iscisco_group_policy, must be sent in the SAML assertion. Click the dropdown arrow to the left ofAttributes (Optional)and in theGroup Attributes Statements (Optional), use thegroupasNameandcisco_gro...
For additional Attribute Statements, see supported attributes. Make sure the identity provider is set to have provider-initiated calls to link existing GitLab accounts.The Okta GitLab application available in the App Catalog only supports SCIM. Support for SAML is proposed in issue 216173....
Sign in to Okta and open your application. Navigate to theSAML Settingspage for your application. In theGroup Attribute Statements (optional)section, configure like the following: Name:groups Name format:Unspecified Filter:Starts with+organization:whereorganizationis the name of your organization The ...
Sign in to Okta and open your application. Navigate to theSAML Settingspage for your application. In theGroup Attribute Statements (optional)section, configure like the following: Name:groups Name format:Unspecified Filter:Starts with+organization:whereorganizationis the name of your organization The ...