Overview
Hindsight supports enterprise Single Sign-On (SSO) via SAML 2.0 using Okta Workforce. Once configured, users in your organization can sign in to Hindsight using their existing Okta credentials — no separate password needed. Setting up Okta SSO is a two-part process:- Your IT admin configures a SAML app in Okta and sends Hindsight a Metadata URL.
- Your Hindsight Success Manager completes the connection on our side and enables it.
What We Support
| Feature | Supported |
|---|---|
| SAML 2.0 | ✅ Yes |
| SP-initiated SSO (sign in from Hindsight) | ✅ Yes |
| IdP-initiated SSO (sign in from Okta dashboard) | ✅ Yes |
| Automatic account linking for existing users | ✅ Yes |
| Multiple email domains per connection | ❌ No — one domain per connection |
Subdomain matching (e.g. sales.company.com) | ⚠️ Available on request |
| SCIM provisioning / automatic deprovisioning | ❌ Not supported — user assignment is managed in Okta |
| Multi-factor authentication (MFA) passthrough | ✅ Yes — Okta MFA is respected |
| OIDC / OAuth SSO | ❌ Not supported for Okta — SAML only |
If you need subdomain support (e.g. users with
@sales.company.com logging in under a company.com connection), let your Success Manager know before setup begins.What You’ll Need
Before starting, make sure you have:- Admin access to your Okta account
- The email domain your users will sign in with (e.g.
company.com) - Two values that Hindsight will provide to you:
- Single Sign-On URL (also called the ACS URL)
- Audience URI (also called the SP Entity ID)
Setup Instructions (For Your Okta Admin)
Step 1: Create a new SAML app integration in Okta
- Sign in to Okta and go to the Admin dashboard.
- In the left navigation, go to Applications → Applications.
- Click Create App Integration.
- In the modal, select SAML 2.0 and click Next.
- Enter an App name (e.g. “Hindsight”) and click Next.
Step 2: Configure SAML settings
On the Configure SAML page:- In the Single sign-on URL field, paste the value provided by Hindsight.
- In the Audience URI (SP Entity ID) field, paste the value provided by Hindsight.
- Leave Name ID format as
EmailAddressand Application username asOkta username.
Step 3: Set up attribute statements
Hindsight requires the following attributes to be mapped in Okta. These are the default Okta values and typically don’t need to be changed, but it’s worth verifying:| Name | Value |
|---|---|
mail | user.email |
firstName | user.firstName |
lastName | user.lastName |
- Scroll to the Attribute Statements (optional) section.
- Add each row from the table above — enter the Name and select the corresponding Value from the dropdown.
- Click Next, fill out the feedback form as you like, and click Finish.
Step 4: Assign users or groups
Before anyone can sign in via Okta SSO, they must be assigned to the app:- Go to the Assignments tab on your new app.
- Click Assign and choose Assign to People or Assign to Groups.
- Search for and assign the relevant users or groups.
- Click Done.
Only users assigned to this Okta app will be able to sign in to Hindsight via SSO. If a user is not assigned, they will not be able to authenticate.
Step 5: Copy the Metadata URL
Once setup is complete:- Go to the Sign On tab of your Okta app.
- Under Sign on methods, find and copy the Metadata URL.
- Send this URL to your Hindsight Success Manager.
What Happens Next (Hindsight’s Side)
Once your Success Manager receives the Metadata URL, they will:- Paste it into the Hindsight/Clerk connection configuration.
- Verify the connection is set up correctly.
- Enable the connection for your domain.
Frequently Asked Questions
Will existing Hindsight users be affected? Yes — any existing user whose email matches your domain will be migrated to SSO automatically. They will be prompted to authenticate through Okta on their next sign-in. What if a user is removed from Okta? If a user is deprovisioned in Okta (removed or deactivated), they will no longer be able to sign in to Hindsight via SSO. However, their Hindsight account and data are not automatically deleted. Contact your Success Manager if you need an account removed. Can we use multiple domains? Each SSO connection supports one domain. If you have users across multiple domains (e.g.companya.com and companyb.com), contact your Success Manager to set up separate connections.
Can users still sign in with a password?
Once SSO is enabled for your domain, users will be routed through Okta and cannot bypass it with a password. If you need a fallback for specific users, let your Success Manager know.
Do you support SCIM for automatic provisioning?
Not currently. User access is managed by assigning or unassigning users in your Okta app. We recommend reviewing assignments before and after employee onboarding/offboarding.