EvTrack + Okta Integration
EvTrack integrates with Okta via SAML 2.0 - enabling administrators and host users to sign in with their corporate Okta credentials and eliminating the need to manage separate EvTrack passwords. Group-based role assignment is supported via Okta group attributes.
Data Transferred to Okta
User Identity (UPN)
Okta username or email used to match or provision the EvTrack user account
Email Address
Email attribute from the SAML assertion mapped to the EvTrack user profile
First Name & Last Name
Name attributes from the SAML assertion synced to the EvTrack user record
Group Memberships
Okta group assignments included in the SAML assertion and mapped to EvTrack roles
Session Token
SAML2 assertion used to establish the EvTrack session - no password stored in EvTrack
How the Integration Works
Administrator creates an EvTrack SAML application in the Okta Admin Console and assigns it to the appropriate users or groups.
The EvTrack server is configured with the Okta federation metadata URI - no manual certificate management required.
Users navigate to the EvTrack SSO login page and are redirected to the Okta login portal.
Okta authenticates the user with their corporate credentials, including MFA policies configured in Okta.
On successful authentication, Okta returns a signed SAML assertion to EvTrack containing the user identity, email, name and group memberships.
EvTrack validates the assertion, maps the user to an existing account (matched by UPN or email), and establishes the session.
Okta group memberships are mapped to EvTrack roles - users can be granted admin, host or site-specific access via Okta group assignments.
On logout, EvTrack initiates a SAML Single Log-Out request to Okta via POST binding, signing the user out of both EvTrack and their Okta session.
Ready to Streamline Your Visitor Management?
Join hundreds of organisations worldwide using EvTrack for secure, seamless access control.