This document will use Okta as the SSO identity provider to demonstrate how to enable SAML authentication protocol for Dify Enterprise. By enabling this feature, the enterprise login page will use a unified identity authentication entry to enhance security. For enterprise internal users, there’s no need to enter complex passwords - they can log in using organizational accounts to pass verification, simplifying the login process.
Access the Okta administrator backend page, navigate to the Applications page, and click the Create App Integration button.
Select “SAML 2.0” application type.
After clicking Next, you will be navigated to the Configure SAML page, where you need to fill in some parameters. Please wait a moment and open a new browser tab, follow the instructions below to get the necessary information, then continue filling.
System administrators need to fill the Dify Enterprise Callback URL into the Okta application.
Click Admin Backend → Identity Authentication → Member → SSO Identity Provider → New Identity Provider → New SAML Provider, and get the Callback URL at the bottom.It usually follows this format:
Paste it into the Single sign-on URL and Audience URI (SP Entity ID) fields on the Configure SAML page.After filling in the URL, continue to complete the following settings:
Set Name ID format to EmailAddress
Under “Show Advanced Settings”, verify that response and assertion signatures are set to Signed
First go to the “Sign On” page of the Okta application and find the following information:
Sign-on URL
Signing certificate
Then go to the “Assignments” page to assign members who are allowed to use SSO login.
Finally, return to the Authentication page of Dify Enterprise, click ”+ New Identity Provider → New SAML Provider”, then fill in the information obtained above to complete the configuration.When filling in the X509 Signing Certificate, please refer to the following format: