Configure Krisp SSO with your IdP

Who can use this?

Plan: Teams, Enterprise (only admins)
Platform: Web
Managed from: Admin Dashboard
Other: IdP account admin privileges 

This article describes how to set up Krisp SSO login with your Identity Provider (IdP). Single sign-on allows you to log in using your company credentials. Krisp's single sign-on (SSO) is based on SAML 2.0.

Check this article to know how you can get started with Krisp SSO. 


Krisp SSO Settings

First, go to your Admin Dashboard >>> Settings >>> Authentication. Check the Enable SSO box and click on SAML to open Configure SAML panel. You'll need this info in the further steps. Let's call this Krisp Settings.


Configuring your IdP with a custom app

Okta Azure JumpCloud GSuite

To configure Krisp with Okta, follow these steps:

  1. In the Okta dashboard of your organization, go to Applications >>> Applications.


  2. Click on Create App Integration.

  3. Select SAML 2.0 as the Sign-on method.

    Click Next.

  4. You will be led to the General tab of the Application page. Insert the following information there:

    - App name: custom name that your teammates will see when signing in. Ex: Krisp Okta
    - App logo: the logo of your company in .png, .jpg, or .gif format that can be visible to your teammates when singing in

    Click Next.

  5. You will be led to the SAML Settings page. Insert the following information there:

    - Single sign on URL: copy the Reply URL (Assertion Consumer Service URL) from Krisp Settings to this field
    - Audience URI: a custom name. Ex: Krisp Okta
    - Name ID format: EmailAddress
    - Application username: Okta username

    Specify the following in the Attribute Statements section:
    - name: email
    - value:


    Copy the Audience URI you set in this step to the Audience URI and Identity Provider Issuer fields of the Krisp Settings.

    Come back to the Okta Dashboard, scroll down and click Next.

  6. You will be led to the Feedback window. Pick one of the two options based on your case:

    Click Finish

  7. In the Okta Dashboard, you will be led to the Sign on Settings. Click on View setup instructions.


    - Copy the Identity Provider Single Sign-On URL to the corresponding field in your Krisp Settings.
    - Copy the X.509 certificate text to the corresponding field in your Krisp settings.
    - Click Configure in the Krisp Settings.


  8. Go back to your Okta dashboard >>> Assignments tab.
    Click on the Assign >>> Assign to People option. Assign those who should be able to log in to your Krisp team with SSO to your application.


Now the assigned email holders will be able to sign in to their Krisp accounts by using the Krisp team slug and authenticating in Okta accounts.


Was this article helpful?
1 out of 1 found this helpful