Ask Zac
integrations intermediate 15 minutes

How to Set Up Zoom SSO with Okta (SAML 2.0)

Step-by-step guide to configuring SAML 2.0 single sign-on between Zoom and Okta — OIN app setup, SAML configuration, attribute mapping, user assignment, and troubleshooting.

Published February 26, 2026

Single sign-on lets your users sign into Zoom with their Okta credentials — centralized authentication, MFA enforcement, and instant deprovisioning when someone leaves.

This guide covers SAML 2.0 SSO setup between Okta and Zoom using the OIN integration. After SSO, set up SCIM provisioning for automated user lifecycle management. For the complete integration picture, see the Complete Guide to Zoom and Okta.

Prerequisites

  • Okta account (any edition)
  • Okta admin access
  • Zoom Business or Enterprise plan
  • Zoom admin account with owner or admin privileges
  • A vanity URL configured in Zoom (e.g., yourcompany.zoom.us)

Step 1: Configure Your Vanity URL

SSO requires a vanity URL — this is what users visit to trigger the Okta login redirect.

  1. Sign in to the Zoom admin portal.
  2. Go to Account Management > Account Profile.
  3. Under Vanity URL, enter your company name (e.g., yourcompany).
  4. Click Save. Your SSO login URL will be https://yourcompany.zoom.us.

Step 2: Add Zoom from the Okta Integration Network

  1. In the Okta Admin Console, go to Applications > Applications.
  2. Click Browse App Catalog.
  3. Search for Zoom and select the Zoom app (the OIN integration).
  4. Click Add Integration.
  5. On the General Settings tab:
    • Subdomain: Enter your Zoom vanity URL subdomain (e.g., yourcompany)
  6. Click Done.

Use the OIN app — don’t create a custom SAML application. The OIN app comes pre-configured with correct SAML settings and supports SCIM provisioning.

Step 3: Get SAML Configuration Values from Okta

  1. In the Zoom app in Okta, go to the Sign On tab.
  2. Verify the pre-filled SAML settings:
    • Single Sign On URL: https://yourcompany.zoom.us/saml/SSO
    • Audience (SP Entity ID): https://yourcompany.zoom.us
  3. Click View SAML setup instructions to get the values you need for Zoom:
    • Identity Provider Single Sign-On URL
    • Identity Provider Issuer
    • X.509 Certificate (download the file)

Keep this page open — you’ll enter these values in Zoom next.

Step 4: Configure Attribute Mapping

On the Sign On tab, verify attribute statements:

Okta AttributeSAML AttributeRequired?
user.emailemailYes
user.firstNamefirstNameYes
user.lastNamelastNameYes

These are typically pre-configured by the OIN app. Add optional attributes if needed:

Okta AttributeSAML AttributePurpose
user.departmentdepartmentUser department in Zoom profile
user.displayNamedisplayNameDisplay name

Step 5: Configure SSO in Zoom

  1. In the Zoom web portal, go to Advanced > Single Sign-On.
  2. Enable SSO and enter:
SettingValue
Sign-in page URLOkta’s Identity Provider SSO URL from Step 3
Sign-out page URLhttps://yourcompany.okta.com (your Okta domain)
Identity provider certificateUpload the X.509 certificate from Step 3
Issuer (IDP Entity ID)Okta’s Identity Provider Issuer URL from Step 3
BindingHTTP-Redirect
Signature hash algorithmSHA-256
  1. Click Save Changes.

Step 6: Assign Users

Back in Okta, assign users to the Zoom app:

  1. Go to the Zoom app > Assignments tab.
  2. Click Assign > choose one:
    • Assign to People — individual users
    • Assign to Groups — entire Okta groups (recommended)
  3. Select the users or groups > click Assign > Save and Go Back.

Only assigned users can authenticate to Zoom via Okta SSO.

Step 7: Test the Configuration

  1. Open an incognito/private browser window.
  2. Navigate to https://yourcompany.zoom.us.
  3. You should be redirected to the Okta sign-in page.
  4. Sign in with an assigned Okta account.
  5. You should land in Zoom, authenticated.

Test the full flow:

  • Sign in via SSO — confirms SAML assertion works
  • Check user profile — confirms attribute mapping (name, email)
  • Sign out of Zoom — confirms sign-out URL redirects to Okta
  • Test MFA (if configured) — confirms Okta sign-on policy applies

Step 8: Configure Sign-In Methods

After confirming SSO works:

  1. In Zoom admin portal, go to Advanced > Security > Sign-in methods.
  2. Recommended: disable password-based login and require SSO for all managed users.
  3. Set managed domains so that any email from your domain is forced through SSO.

Next: Set Up SCIM Provisioning

SSO handles authentication. For automated user lifecycle (auto-create accounts, auto-deactivate on departure, group-based licensing), configure SCIM next.

Set up SCIM provisioning with Okta →

Common Issues

  • SSO redirect loop — The most common cause is an Entity ID mismatch. Copy the exact Issuer URL from Okta’s SAML setup instructions and paste it into Zoom. Check for trailing slashes, protocol differences (http vs https), or extra whitespace.
  • “SAML response is not valid” error — The X.509 certificate in Zoom doesn’t match what Okta is signing with. Re-download the certificate from Okta and re-upload to Zoom. Also check that the certificate hasn’t expired.
  • User can’t sign in (“Not assigned”) — The user isn’t assigned to the Zoom app in Okta. Go to the Zoom app > Assignments and verify the user or their group is listed.
  • SSO works but user gets a new Zoom account — The email in the SAML assertion doesn’t match the existing Zoom account email. Verify attribute mapping sends user.email as the email claim. If the user signed up with a different email, update their Zoom account email to match their Okta email.
  • MFA not prompting — Check the sign-on policy for the Zoom app in Okta. MFA policies are per-app — you may need to add a policy rule specifically requiring MFA for the Zoom application.
  • Mobile SSO not working — The Zoom mobile app supports SAML SSO. Users tap “Sign in with SSO,” enter the vanity URL domain, and are redirected to Okta’s mobile sign-in. If Okta blocks mobile browsers, check your Okta device trust policies.

Frequently Asked Questions

How do I set up SSO for Zoom using Okta?

In the Okta Admin Console, add Zoom from the Okta Integration Network (OIN) catalog, configure the SAML settings (pre-filled by the OIN app), download the IdP metadata, then enter it in Zoom's admin portal under Advanced > Single Sign-On. Assign users or groups in Okta, and they can sign into Zoom via Okta.

Does Okta have a pre-built Zoom integration?

Yes. Zoom is in the Okta Integration Network (OIN) with a dedicated, well-maintained SAML app. Use the OIN app instead of creating a custom SAML application — it comes with pre-configured attribute mappings and SCIM support.

Can I enforce MFA for Zoom through Okta?

Yes. Okta's sign-on policies can require MFA before accessing Zoom. Configure a sign-on policy rule for the Zoom app that requires Okta Verify, FIDO2, SMS, or another factor. MFA is handled entirely on the Okta side.

What Zoom plan do I need for Okta SSO?

Zoom Business or Enterprise. SSO is not available on the Zoom Pro plan. You also need a vanity URL configured (e.g., yourcompany.zoom.us).

Can I use Okta SSO for Zoom and still allow password login?

Yes. In Zoom's security settings, you can configure sign-in methods to allow both SSO and password. However, for security, most organizations disable password login after SSO is working and require all managed users to authenticate through Okta.

Need help configuring this?

Ask Zac can walk you through the setup step by step, or configure it for you automatically.

Try Ask Zac →