Single Sign-On
Enabling SSO with SAML
Study Tracker support SAML2 single-sign-on using either Okta or Microsoft Entra as identity providers.
Creating a key store
Regardless of which identity provider you choose, you will need to create a Java key store (JKS) for the application to store credentials from the provider. Generate a JKS keystore and save it in the same directory that the study-tracker.war
file is located. For example:
Add the key store location, alias, and password to your application.properties
file:
Okta
Create a Study Tracker application in Okta
Configure your application in the Okta portal. Be sure that you use SAML 2 and not OAuth. Using your Study Tracker host as a root URL, configure the Okta app to use the following endpoints for your Study Tracker instance:
Single Sign-On URL:
/login/saml2/sso/okta
Audience URI (SP Entity ID):
/saml/metadata
So for example, if your Study Tracker app was being hosted at https://mystudytracker.com:8443
, the SSO URL value would be https://mystudytracker.com:8443/login/saml2/sso/okta
. These URLs are case-sensitive.
Prior to v1.0, the Single Sign-On URL provided to Okta was /saml/SSO
Configuring Study Tracker for Okta SAML authentication
Add the following items to your application.properties
file:
The sso.okta.url
value refers to the URL that Okta generates and uses as the entrypoint to authentication for the application. This will be used to generate a link in the web application to allow users to trigger authentication with their Okta provider (as opposed to clicking the Study Tracker link on their Okta dashboard). The saml.idp
and saml.metadata-url
values refer to the Identity Provider Issuer and Identity Provider metadata URL values in the Okta app configuration, respectively. The saml.audience
value should configured as your application's host, with /saml/metadata
appended to it.
Entra ID
Setting Up the Application in Entra ID
Step 1: Create a New Enterprise Application in Entra ID
Navigate to Identity > Applications > Enterprise applications
Click + New application
Select Create your own application
Enter a name for your application (e.g., "Study Tracker")
Select Integrate any other application you don't find in the gallery (Non-gallery)
Click Create
Step 2: Configure SAML Settings
In your new application, go to the Single sign-on section
Select SAML as the sign-on method
Configure the following settings:
Basic SAML Configuration
Identifier (Entity ID): Enter the URI that identifies your Study Tracker application
Format:
https://[your-study-tracker-domain]/saml/metadata
Example:
https://studytracker.example.com/saml/metadata
Reply URL (Assertion Consumer Service URL): Enter the URL where Entra ID will send the SAML response
Format:
https://[your-study-tracker-domain]/login/saml2/sso/entra
Example:
https://studytracker.example.com/login/saml2/sso/entra
Sign on URL: Enter the URL where users will start the login process
Format:
https://[your-study-tracker-domain]/login
Example:
https://studytracker.example.com/login
Relay State: Leave empty or specify a URL where users should be directed after authentication
Configure Study Tracker Properties
Add or update the following properties in your Study Tracker application.properties
file:
Replace the example values with your actual configuration:
sso.entra.url
: The Login URL from Entra IDsaml.audience
: The Identifier (Entity ID) you configured in Entra IDsaml.idp
: The Issuer URL from Entra ID (typically in the format shown)saml.metadata-url
: The URL to the Federation Metadata XML from Entra IDsaml.metadata-base-url
: The base URL of your Study Tracker application
Last updated