Set Up Okta SSO for JustCall

Manage my account3 min readUpdated 2026-03-12

Set Up Okta SSO for JustCall

Okta SSO lets your team authenticate to JustCall through Okta's identity platform. This removes the need for separate JustCall passwords and gives your IT team control over access from a single dashboard. SSO is available on the Business plan.


Prerequisites

  • JustCall Business plan
  • Okta admin access (Super Admin or Application Admin role)
  • A verified email domain in JustCall

Step 1: Enable SSO in JustCall

  1. Go to Settings → Security → Single Sign-On in JustCall.
  2. Click Enable SSO and select SAML 2.0.
  3. Copy the ACS URL and Entity ID.

Step 2: Create a SAML App Integration in Okta

  1. Log into the Okta Admin Console.

  2. Go to Applications → Applications → Create App Integration.

  3. Select SAML 2.0 and click Next.

  4. Set the App name to JustCall. Upload a logo if desired. Click Next.

  5. Configure SAML settings:

    FieldValue
    Single sign-on URLPaste the ACS URL from JustCall
    Audience URI (SP Entity ID)Paste the Entity ID from JustCall
    Name ID formatEmailAddress
    Application usernameOkta username (email)
  6. Add attribute statements:

    NameValue
    emailuser.email
    firstNameuser.firstName
    lastNameuser.lastName
  7. Click Next.

  8. Select I'm an Okta customer adding an internal app and click Finish.


Step 3: Copy Okta Identity Provider Details

  1. In the Okta app you just created, go to the Sign On tab.
  2. Under SAML Signing Certificates, click Actions → View IdP metadata for the active certificate.
  3. From the metadata page (or the Sign On tab details), copy:
    • Identity Provider Single Sign-On URL
    • Identity Provider Issuer
  4. Download the X.509 Certificate.

Step 4: Complete Configuration in JustCall

  1. Return to Settings → Security → Single Sign-On in JustCall.
  2. Enter:
    • SSO URL: Identity Provider Single Sign-On URL
    • Issuer / Entity ID: Identity Provider Issuer
    • Certificate: Upload the X.509 certificate
  3. Set the Default Role for new SSO users.
  4. Click Save Configuration.
  5. Click Test Connection.

Step 5: Assign Users and Groups

  1. In the Okta Admin Console, go to your JustCall application.
  2. Click the Assignments tab.
  3. Click Assign → Assign to People or Assign to Groups.
  4. Select the users or groups and click Assign, then Save and Go Back.

Only assigned users can access JustCall through Okta. If a user is unassigned, they immediately lose SSO access.


User Login Flow

  • From Okta: Users click the JustCall tile in their Okta dashboard.
  • From JustCall: Users click Sign in with SSO on the login page and enter their company email. They are redirected to Okta for authentication.

Troubleshooting

IssueSolution
"Invalid SAML response"Verify the ACS URL and Entity ID match between Okta and JustCall. Check for trailing slashes.
User gets "not assigned" errorAssign the user to the JustCall app in Okta (Assignments tab).
Attributes missingConfirm attribute statement names exactly match: email, firstName, lastName.
Certificate errorRe-download the active certificate from Okta. Expired certificates cause authentication failures.

Was this helpful?