See how AI is powering the 5-stage social engineering attack chain — and how to break it (opens in new tab)
Documentation

Doppel Okta Setup Instructions

Configure Okta Single Sign-On for Doppel

This guide explains how to configure Single Sign-On (SSO) between Okta and Doppel using the Doppel application available in the Okta Integration Network (OIN).

After completing the configuration, users assigned to the Doppel application in Okta will be able to authenticate to Doppel using their Okta credentials.

If you use an IDP other than Okta, please reach out to your Doppel Contact, or email [email protected]. We also support Entra AD, Ping Federate, Google Workspace, Custom SAML and Custom OIDC connections.

Prerequisites

Before configuring the integration, ensure the following requirements are met:

  • You have administrator access to your Okta organization.
  • Your organization has an active Doppel account.
  • Users who will authenticate through Okta exist in both Okta and Doppel.

Supported Features

The Doppel Okta integration supports the following features:

SP-Initiated Single Sign-On

Users initiate login from the Doppel login page and are redirected to Okta for authentication.

Universal Logout

When a user logs out of Doppel, their Okta session can also be terminated to ensure the user is fully signed out of the identity provider session.

Express Configuration

The Doppel integration supports Okta’s Express Configuration, allowing administrators to quickly configure the application using the Okta Integration Network.

Configure the Doppel Application in Okta

Follow the steps below to configure the Doppel integration in Okta.

Step 1 — Add the Doppel Application

  1. Sign in to the Okta Admin Console.
  2. Navigate to Applications → Browse App Catalog.
  3. Search for Doppel.
  4. Select the Doppel application.
  5. Click Add Integration.

Adding the application from the Okta Integration Network automatically creates the required OIDC application configuration.

Step 2 — Express Configuration

  1. Select the Express Configuration-enabled application from the OIN.
  2. Navigate to the Sign On section and select Express Configure SSO & UL. This redirects them to an Auth0 Universal Login screen.
  3. The Okta administrator enters the credentials of an application user who is permitted to perform Express Configuration. (Doppel will set this up for you, and will have you login via OTP)
  4. After authenticating, Auth0 prompts the Okta administrator for consent.
  5. After consenting, Okta uses the Express Configuration API to automatically configure an Okta connection within the Auth0 organization to which the Okta administrator belongs.
  6. The Okta administrator may then assign users to the application instance and see single sign-on working immediately.

Step 3 — Assign Users or Groups

  1. Open the Doppel application in Okta.
  2. Navigate to the Assignments tab.
  3. Click Assign.
  4. Assign the users or groups that should have access to Doppel.

Only assigned users will be able to authenticate with Doppel.

Step 4 — Universal Logout

To enable Universal logout, please follow the below steps:

  1. Ensure the Workforce Identity SKU/License for Identity threat protection is enabled for the org.
  2. In the Okta Admin Console, navigate to Applications > Applications > app that supports Universal Logout.
  3. On the app's page, select the Authentication tab.
  4. In the Logout section, click Edit.
  5. Select Okta system or admin initiates logout.

User Login Flow

After SSO is configured, users can authenticate to Doppel using Okta.

  1. Navigate to the Doppel login page: https://app.doppel.com
  2. Enter your work email address.
  3. Doppel redirects the user to Okta for authentication.
  4. After successful authentication, the user is redirected back to Doppel.

Universal Logout

If Universal Logout is enabled, logging out of Doppel will also terminate the user’s Okta session.

This ensures the user is fully signed out of the identity provider session and prevents reuse of an existing authentication session.

Additional Notes

  • Only SP-initiated login is supported.
  • IdP-initiated login is not supported.
  • Just-in-Time (JIT) provisioning is not supported.
  • Users must exist in both Okta and Doppel to authenticate successfully.

Learn how Doppel can protect your business

Join hundreds of companies already using our platform to protect their brand and people from social engineering attacks.