New: AI Compliance Intelligence — automate gap analysis across 30+ standards. Read the announcement
Back to all articles
Tutorials Apr 8, 2026 · 6 min read

Setting up SAML SSO with Okta in 10 minutes

Step-by-step walkthrough with screenshots, including SCIM 2.0 provisioning and group-based role mapping.

SC
Sara Chen
Solutions Engineer
Code editor with security configuration

Single sign-on isn’t just about user convenience — it’s a foundational security control. Here’s the fastest path to production.

Prerequisites

  • Quays workspace on Business or Enterprise plan
  • Okta admin access
  • 15 minutes

Step 1: Create the SAML app in Okta

In Okta admin, go to Applications → Browse App Catalog → search "Quays" → Add Integration.

Step 2: Configure attribute mappings

  • email → user.email
  • firstName → user.firstName
  • lastName → user.lastName
  • groups → user.groups (filter starts with "quays-")

Step 3: Enable SCIM provisioning

In the Quays app within Okta, enable Provisioning → To App. Paste the SCIM endpoint and bearer token from Quays Admin → Authentication → SCIM Setup.

You’re done

Test by assigning yourself to the app. You should land in Quays automatically with the correct role assigned via group mapping.

SC
Written by
Sara Chen
Solutions Engineer

Unlock world-class
quality management

Join 2,000+ organizations that trust Quays to manage quality, compliance, and continuous improvement. See how it works for your team.