Configure UFT Mobile with Identity Provider (IdP) - Okta example

over 1 year ago


UFT Mobile supports single-sign on via SAML 2.0. The configuration steps are outlined here

UFT Mobile provide support for dynamic SAML configuration, but different providers are using different names and settings for the integration. In the guide below we will outline the steps for configuring UFT Mobile with Okta - popular cloud software that helps companies manage and secure user authentication for modern applications.







  • Click Next
  • In Configure SAML pane provide the following (from the values copied in second step)
    • Single sign on URLAssertionConsumerService Location value
    • Audience URI (SP Entity ID): entityID valueScreen Shot 2019-12-02 at 16.57.12.png
  • Set Name ID format to Email Address
  • Click Finish
  • Click on View Setup Instructions button
  • Scroll down and copy the generated XML file from Provide the following IDP metadata to your SP provider - we will be using it for UFTM SSO configuration

Screen Shot 2019-12-02 at 17.00.24.png






  • Click on Assignment tab and assign the application to user or group of users
  • Return back to UFT mobile SSO Settings screen and fill out the following values:
    • Enable SSO: yes
    • IdP SAML metadata: paste the XML file copied in the previous step from Okta
    • Administrator login name: the user that was associated with the app in previous step
    • Username attribute identifier: {$id}
  • Log out from UFT Mobile and relaunch the browser

You have successfully configured UFT Mobile to use Okta authentication via SAML protocol: on the login, the user will be redirected for login to Okta and on success it will be logged into UFT Mobile.

For more questions, please don't hesitate to contact us at



Comment List
Related Discussions