Set Up Okta as a Single Sign-On (SAML) Provider for net2phone Sync

Learn how to configure Okta for seamless Single Sign-On (SAML) integration with net2phone Sync, enhancing security and user access.

Written By Sara Mosher (Super Administrator)

Updated at May 11th, 2026

Configure Okta as a Single Sign-On (SSO) provider for net2phone Sync using SAML. You will create the SAML app integration in Okta, copy the required Okta values, then complete the setup in the Sync Settings portal.

Requirements and notes

  • Before you begin, ensure your organization has administrative access to both the Okta Admin Console and the net2phone Sync Settings portal.
  • Your net2phone account must have SSO configuration access enabled.
  • Okta SSO setup may fail if your organization requires custom SAML values or a different identity configuration. Use the Okta Admin Console to generate the values specific to your organization.
  • Supported features: The Sync SAML integration currently supports IdP-initiated SSO and SP-initiated SSO.

For additional reference, see the Okta SAML setup guide.

 

Configure Okta for Sync

Start in the Okta Admin Console. Create the SAML app integration, enter the required Sync values, and assign the app to the users or groups who should be able to sign in with Okta.

Create the Okta SAML app integration

From the Okta Admin Console, go to Applications > Applications.

  1. Click Create App Integration.
  2. Select SAML 2.0.
  3. Click Next.
Example: SAML 2.0 app integration selection.

Enter the general app settings

Enter an app name, such as net2phone Sync or Sync. You can also upload an app logo if needed.

Click Next to continue to the SAML configuration page.

Example: General app settings and app name.

Enter the Sync SAML settings in Okta

In the SAML configuration page, enter the following values.

  • Single sign-on URL: https://auth.net2phone.com/saml/login/callback
  • Audience URI (SP Entity ID): n2p
  • Name ID format: EmailAddress

After entering these values, click Next.

Example: SAML settings with the Single sign-on URL and Audience URI.

Note: If Okta displays feedback questions on the next screen, complete them if needed, then click Finish.


Assign the app to users or groups

After the app is created, open the new Sync app and select the Assignments tab.

Assign the application to the users or groups who should be allowed to sign in with Okta.

Example: Okta Assignments tab.

Open the SAML setup instructions

Open the Sync app integration in Okta, then click View SAML setup instructions.

Example: View SAML setup instructions.

To return to the SAML setup instructions later, go to Applications, open your Sync app, and select the Sign On tab.


Copy the Okta SAML values and download the certificate

Note the SAML values shown by Okta. You will need these values to complete the SSO setup in Sync.

  • Identity Provider Single Sign-On URL: Used as the Login URL in Sync.
  • Sign-out URL: Used as the Logout URL in Sync, if your organization uses one.
  • X.509 Certificate: Used as the Public Certificate in Sync.

Download the X.509 Certificate before moving to Sync.

Example: Sign On tab location.

Finish the SSO setup in Sync

After you collect the required values from Okta, complete the SSO configuration in the Sync Settings portal.

Sign in to Sync

Sign in to Sync at https://app.net2phone.com.


Open the Single Sign-On settings

From the left navigation menu, click Settings, then select Single Sign-On.


Enter the Okta SAML values in Sync

In the Single Sign-On settings page, enter the following values from Okta.

  • Login URL: Enter the Identity Provider Single Sign-On URL from Okta.
  • Logout URL: Enter the Okta sign-out URL, if your organization uses one.
  • Entity ID: Enter n2p. This must match the Audience URI value entered in Okta.
  • Public Certificate: Upload the X.509 Certificate downloaded from Okta.
Example: Sync SSO configuration page.

Test the configuration

Click Test Configuration to validate the connection between Okta and Sync.

If the test succeeds, click Submit.

Example: Test Configuration and Submit buttons.

Before you enable SSO

Confirm that the configuration test succeeds and that the required users or groups are assigned to the Sync app in Okta. If SSO is enabled before the configuration is complete, users may not be able to sign in with Okta.

 

Enable SSO

When you are ready to begin using Okta authentication, turn on the SSO toggle in Sync.

Example: Enable SSO toggle.

Supported SAML attributes

Sync uses the user’s email address to match the Okta identity to the corresponding Sync user.

Name Value
Email user.email

Sign in with SP-initiated SSO

After SAML 2.0 is configured and enabled, users can sign in through the standard Sync login flow.

  1. Go to https://app.net2phone.com.
  2. Enter your email address.
  3. Click Next.
  4. Complete the Okta authentication flow.

SSO setup complete

After SSO is enabled, assigned users can authenticate with Okta to access Sync.

 

Tips and troubleshooting

Use the following checks if the Okta SSO configuration does not work as expected.

Issue What to check
The configuration test fails Confirm that the Login URL, Entity ID, and Public Certificate values in Sync match the values provided by Okta.
A user cannot sign in with Okta Confirm that the user is assigned to the Sync app in Okta and that their Okta email address matches their Sync user email address.
The SSO option is not available in Sync Confirm that your net2phone account has SSO configuration access enabled.
The logout flow does not work as expected Confirm whether your organization uses a sign-out URL in Okta. Some configurations may not require a Logout URL.