Welcome Edit the Doc Site Product Offerings Program Starting Point Navigation Organization Dropdown Program Types Private vs. Public Programs Parent/Child Programs VDP vs. BBP Using Markdown Industry Best Practices Authenticated Testing Scoping Considerations Traffic Identification Detailed Platform Standards Engagements Campaigns Organization Profile Users Groups Asset Inventory Asset Types External Attack Surface Management Solution Single Sign-On via SAML JIT Provisioning Domain Verification Google Okta OneLogin FAQs General Settings User Management Groups and Permissions Security Page Program Metrics Response Target Indicators Top Hackers Policy and Scope Good Policies Standard Ineligible Findings Safe Harbor FAQ Gold Standard Safe Harbor Statement Program Levels Defining Scope Scope Best Practices Severity Environmental Score Bounty Tables Importance of Bounty Tables Internet Bug Bounty Submit Report Form Report Templates Pausing Report Submissions Response Targets Response Target Metrics Setting Response Targets Invitations Reputation Signal and Impact CVE Requests Submission Signal Requirements Two-Factor Authentication Invalid OTP Code Sessions Credential Management Asset-Based Credential Management Notifications Response Programs Using the Support Portal Inbox Inbox Views Report Management Report Actions Report States Report Components Quality Reports Locking Reports Duplicate Reports Duplicate Detection Exporting Reports Response Labels Keyboard Shortcuts Custom Fields Disclosure Limiting Disclosed Information Retesting Request Code Review (BETA) Vacations HackerOne on Your Program Supported Integrations Integration Variables Webhooks API Tokens Assembla AWS Security Hub Azure DevOps Brinqa Bugzilla ClickUp ClickUp Setup Freshdesk GitHub GitLab HackEDU IBM Security QRadar SOAR Jira Jira Setup Jira Migration Guide Jira FAQs Kenna Security Linear Linear Setup MantisBT Microsoft Teams OTRS PagerDuty Phabricator Redmine SafeBase ServiceNow Slack Splunk Sumo Logic Trac Zendesk Billing Bounties Swag Bonuses Dashboards Program Overview Submissions Dashboard Bounty Dashboard Statistics Dashboard Hacker Engagement Dashboard Hacker Feedback Dashboard Response Efficiency Dashboard Explore Program Status Reports Audit Logs Industry Benchmarking Hacktivity CVE & CWE Discovery Communicating with Hackers Message Hackers Banning Hackers Hacker Email Alias Program Mediation & Code of Conduct Review Requests Hacker Reviews Disclosure Assistance HackerOne Clear Gateway Gateway V1 FAQs Gateway V1 Pentest as a Service (PTaaS): Enhanced Pentest Delivery Pentester Selection and Vetting Process Pentest Phases and Terminology Structure Pentest Engagement Process Scoping Size Pentester Roles and Responsibilities Tiers Pentesting Methodology Reporting Pentest Deliverables Retesting Getting to Know Your Dedicated Pentest Team FAQs Automation Common Responses Triggers Hackbot Email Forwarding Embedded Submission Form Import Vulnerabilities IP Allowlists Multi-Party Coordination Password Best Practices Proof of Compliance Slack Shared Channels Reducing Noise Team Member Eligibility Okta SSO Setup via SAML You can use your Okta credentials to sign in to HackerOne. To set up SSO via SAML for Okta:
Log in to Okta.
Click the Admin button.
Click +Add Application under Shortcuts.
Search for the HackerOne application and click Add .
Select the options you'd like in your General Settings.
Click Next .
Click View Setup Instructions on the Sing-On Options tab to open the "How to Configure SAML 2.0 for HackerOne" page. Keep this page open for setting up SAML for HackerOne in the later steps.
Update the Credentials Details section and click Done .
Assign the HackerOne application to the people or groups that should have access to the application on the Assignments tab.
Open HackerOne in a new tab.
Follow the SAML setup instructions here .Copy the Single-Sign On URL and the X.509 Certificate from the “How to Configure SAML 2.0 for HackerOne” page that you accessed in step 7 and paste them in the corresponding fields during setup.