Contents
Features
- Allow Okta users to create Highfive accounts and log in via Okta Sign On
- Give Okta administrators the ability to provision and manage Highfive users:
- Create new Highfive user accounts through Okta
- Disable Highfive user accounts through Okta
- Update Highfive user names through Okta
Requirements
- Be logged in as a Highfive Admin
- Be logged in as an Okta Super or Org Admin
- Use Okta's Classic UI
- If you are using a different view (ex. Developer Console), follow the steps outlined under the Organized Navigation section here to switch to the Classic UI.
Configuration Instructions
Sections:
If you already have the Highfive application set up in Okta from a previous Okta Sign On configuration, you can skip this section and go directly to Sign On.
- Navigate to your Okta Dashboard.
- Click Applications at the top of the Okta Dashboard and select Applications.
- Click Add Application.
- Use the search bar to look for Highfive.
- Once Highfive pops up as a result, click Add.
- On the next General Settings page, input your Highfive Subdomain.
- Your subdomain is: YourSubdomain.highfive.com
- Click Done.
- Select the Sign On tab. (This is next to the General tab you were on previously.)
- Click Edit at the top of the Settings menu.
- Important: Under the CREDENTIALS DETAILS section, your Okta username format setting will determine which attribute in the Okta user profile will be passed within the SAML assertion as the Highfive email address.
- Your selection for Okta username format needs to match the value you are passing as the email attribute from Okta to Highfive, or it will result in duplicate users being created with a different email value. We'll walk you through configuring this in the next step.
- If you...
- Are setting up the Highfive application for the first time: Set Application username format to Email.
- Already have SAML functionality enabled for the Highfive application in Okta and are using Okta username as the Okta username format:
- Click Configure profile mapping.
- Select the Okta to Highfive tab.
- Set your mapping to the following configuration, then click Save Mappings.
- user.firstName → givenName
- user.lastName → familyName
- user.login → email
- Click Save once you're back on the Settings menu.
- If you have not previously configured SAML 2.0 in the past for Highfive Single Sign On with Okta, you will need to do it now.
- Click View Setup Instructions and complete the provided steps.
- Click View Setup Instructions and complete the provided steps.
- After you complete the SAML 2.0 configuration, navigate back to the Highfive application in Okta.
- Click on the Provisioning tab. (This is next to the Sign On tab you were on previously.)
- Click Configure API Integration.
- Check the Enable API integration box.
- Click Authenticate with Highfive.
- A permissions window will open, informing you what actions you are allowing Okta to perform on your behalf. To proceed, click Allow.
- You will be redirected back to Okta and should see a message stating Highfive was verified successfully.
- Click the Save button.
- Once the page reloads, select To App in the left sidebar and then click Edit.
- Check the Enable box for the following provisioning options:
- Create Users
- Update User Attributes
- Deactivate Users
- Skip Highfive Attribute Mappings. You do not need to modify this section at the bottom.
- Click Save.
- Highfive! You're done with the configuration. You can learn more about how to manage your users via Okta here.
Known Issues
- Issue: Updating the Primary Email for a user in Okta does not push the change to Highfive.
- Details: If you update the email address for a user in Okta, it will not update in Highfive. This also includes scenarios where SAML was set up previously using Okta.userName and then changed to Okta.email.
- Fix: This is currently expected behavior. Our team is aware of and will work on resolving it. When this is fixed, updates to email addresses made in Okta will push successfully to Highfive.
- Issue: Creating a new user profile after updating a previous user profile can lead to invalid responses when attempting to verify user data.
- Details: If you update the username for a user in Okta, then create a second profile with the same username, then attempts to verify profile creation between Highfive and Okta will fail with a result saying there are too many matches.
- Fix: Please contact Highfive Support and we will fix the username that should be disabled.