Setting up SSO with Okta via SAML

This guide walks you through how to configure Single Sign-On (SSO) in Okta using the SAML 2.0 protocol to enable centralised authentication for your team in the Bitmovin Dashboard.

Prerequisites

Before you begin, make sure you have:

  • Administrator access to Okta
  • Administrator privileges in your Bitmovin organization

Note: All Bitmovin organizations support SSO. However, only organization admins can set up or modify SSO settings.

Step 1: Create a SSO Organization in Bitmovin Dashboard

  1. Log in to the Bitmovin Dashboard.

  2. Navigate to Organization Settings → SSO Configuration.


  3. Click Add new SSO

  4. Enter a Domain you use for your organization (eg. Bitmovin)

    • Bitmovin will generate the following values, which you’ll use in the Okta setup:
      • ACS URL (Single Sign-On URL)
      • Audience Restriction (Audience URI)

Make note of these values or keep the tab open for reference in the next step.

Step 2: Create a New SAML Application in Okta

  1. Log in to the Okta Admin Console.
  2. Go to Applications → Applications.
  3. Click Create App Integration.
  4. Choose SAML 2.0, then click Next.

Step 3: Configure the SAML Settings in Okta

In the General Settings, choose a name like Bitmovin and optionally upload a logo.

Click Next, and enter the SAML configuration using the values from Step 1:

SAML Settings

FieldValue
Single sign-on URLCopy "ACL Url" from the Bitmovin Dashboard
Audience URI (SP Entity ID)Copy "Audience Restriction" from the Bitmovin Dashboard
Application usernameEmail

Click Next, then Finish.

Step 5: Retrieve IdP Metadata from Okta

In the Okta application, open the Sign On tab.

  • Click More details
  • Copy the Single Sign-On URL and paste it into the Bitmovin Dashboard Sign On URL
  • Copy the Issuer and paste it into the Bitmovin Dashboard
  • Copy the Signing Certificate and paste it into the Bitmovin Dashboard
  • Select which groups your new users should be automatically be added to under Configure the Bitmovin organization groups
  • Click Save

Step 6: Test the Integration

  1. Log out of the Bitmovin Dashboard
  2. Visit your Okta My Application List and click the newly created Bitmovin App
  3. You should be automatically logged into the Bitmovin Dashboard

Optional Step 7: Configure your Organization Team

Once you’ve confirmed that SSO login works:

  1. Promote your SSO-based user to Organization Admin:
    • Go to Organization Settings → Team.
    • Locate your newly logged-in SSO user and assign them the Admin role.
  2. Remove non-SSO user accounts:
    • To prevent login via email/password, remove all traditional (non-SSO) users from the team.
    • This ensures all future logins go exclusively through Okta.

⚠️

Be sure your SSO user has full admin rights before removing other admins.