Okta SAML SSO
Okta is an Identity Provider (IdP) that enables secure single sign-on (SSO), allowing your company’s users to access multiple applications with one login.
With Security Assertion Markup Language (SAML) SSO, employees sign in once using their company credentials (typically email and password). The IdP, such as Okta, verifies their identity and grants seamless, secure access to all connected services, without requiring separate logins for each application.
Company owners or IT administrators can link their organization’s email domain (e.g., @mycompany.com) to the IdP so that anyone with a company email address is automatically recognized and can securely sign in to SAML-enabled tools.
Using Kinsta SAML SSO, you can connect Okta to MyKinsta by creating a SAML application within Okta, verifying your company’s email domain, and adding the required Okta details in MyKinsta. This allows your team to log in with their existing company credentials, eliminating the need to create or manage separate MyKinsta accounts.
Enable SSO in MyKinsta
When you set up SAML SSO, you can click Save and exit setup at any stage to store your progress and return later.
In MyKinsta, go to your username > Company settings > Single sign-on, and click Enable.

Read through the introduction, which explains how SSO will be set up, and click Continue.

The next page provides all the information you need to set up your SAML app within Okta.
Set up the app integration in Okta
In MyKinsta, the Create SAML app tab provides all the information you need to set up your SAML app within Okta. The following steps explain where to add this information.

Log in to Okta as a user with admin access, and within the Admin Dashboard, click Applications > Create App Integration.

Select SAML 2.0 as the sign-in method and click Next.

Enter the App name from MyKinsta. You can also download the App icon from MyKinsta and upload this to the App logo, if required. Click Next.

Complete the Configure SAML in Okta as follows:
- Single sign-on URL: Copy and paste the SSO/ACS URL from MyKinsta.
- Audience URI (SP Entity ID): Copy and paste the Entity ID from MyKinsta.
- Name ID format: EmailAddress
- Application username: Email
- Update application username on: Create and update
Leave all other fields as default and click Next.

On the Feedback tab, click Finish.

You now need to set up the SAML app within MyKinsta.
Kinsta setup
In MyKinsta, on Create SAML app, click Continue so that you are on the Kinsta setup page.
Email domain
In the Domain name, enter the email domain users will use to sign in using SAML SSO, and click Add domain.
Only MyKinsta accounts with an email address matching the verified domain can authenticate via SAML. For example, if SAML is enabled for example.com
, only users with an @example.com
email address will be able to sign in for that company.
If the domain has already been verified in MyKinsta through DNS management or as a site domain, it will automatically be verified. If it hasn’t, you’ll be prompted to add a TXT record to your DNS management service to confirm domain ownership.

Because DNS changes can take time to propagate, you can click Save and exit setup to store your progress and return later.
Set up Kinsta SAML
In Okta, go to Applications, select the application you set up for the MyKinsta Dashboard, click Sign On, and then click View SAML setup instructions.

This page provides all the information you need to set up SAML in MyKinsta.

In MyKinsta, within the Single sign-on Kinsta setup tab, complete the fields as follows:
- SSO URL: Copy and paste the Identity Provider Single Sign-On URL from Okta.
- Entity ID: Copy and paste the Identity Provider Issuer from Okta.
- Public certificate: Copy and paste the X.509 Certificate from Okta.
Click Continue.

Assign users to the Okta app
In Okta, go to Applications, select the application you set up for the MyKinsta Dashboard, and click Assignments.

Click Assign and then click Assign to People. If you have your users set up in groups, click Assign to Groups. Click Assign on each user or group you want to assign to the Kinsta SAML SSO application and then click Done.
To test authentication, make sure the MyKinsta user account you’re signed in with is assigned.

Test the authentication in MyKinsta
You cannot enable SAML SSO within MyKinsta without first testing the authentication.
In MyKinsta, within the Single sign-on Test and finish tab, click Test authentication.

A notification appears if the test was successful or if the test fails.
If the test fails, click Back and check your SAML settings within Okta and within MyKinsta.
If the test is successful and you want to enable SAML, click Save and set changes live.
Your MyKinsta company users will now be able to sign in with SAML SSO or by entering their username and password. Users who sign in through an IdP are not required to complete Kinsta’s 2FA, as authentication is handled directly by the IdP.
If you want to force users to sign on via SAML, you can enable Mandatory SSO and add Exceptions. You can also enable JIT provisioning to allow users authorized by your IdP to access your MyKinsta company without requiring an invitation.

Change the session duration
The SSO session duration and expiration are controlled by your identity provider (IdP). For information about how to change this in Okta, refer to the Okta Help Center.