Okta
Single Sign-On (SSO) functionality for enterprise customers is available to access Reimbi through a single authentication source, like Okta. This allows IT administrators to better manage team access and keeps information more secure. SSO is only used for staff account users. It has no impact on your requesters/candidates.
Reimbi uses SAML (Security Assertion Markup Language), a standard that permits identity managers, Okta for example, to safely pass authorization credentials to service providers like Reimbi.
Okta setup
These are instructions for setting up Reimbi SAML SSO with Okta. You can always follow steps on Okta's website here:
Create a new application integration
Platform: select Web from the dropdown. Sign on method: select SAML 2.0.
Create SAML integration
- App name: Reimbi
- Logo: https://www.reimbi.com/branding
SAML settings
Single sign on URL and Audience URI: found on the Single Sign On (SSO) tab in Reimbi Company Settings
Assign users to Reimbi
In Okta's Assignments tab, you can now assign users to Reimbi.
Reimbi setup
Metadata URL
- Navigate to Company Settings and select the Single Sign On (SSO) tab.
- Identity Provider metadata URL: enter the URL provided by Okta here (Sign on tab in Okta application settings):
Log in to Reimbi using Single Sign On (SSO)
After a user is correctly provisioned in Okta, that user will need to start their initial Reimbi login from within Okta.
For direct Reimbi login, go to the login page (https://app.reimbi.com/account/login/). If the email entered belongs to a provisioned user, that user will automatically be redirected to sign in via the Okta application.
Note that the user will not appear on the Staff accounts page in Reimbi until after the staff users initial login to Reimbi.
Default and additional permissions
Select the permissions that new staff users will be assigned by default. Individual modifications can then be made as needed on the Company Settings -> Staff accounts page.
Changes here have no impact on existing staff users.