Configuring SAML 2.0 with Okta

Edited

Enabling SAML will impact all users who use Fathom. Once enabled, existing users will not be able to sign in through their regular sign-in page.

When we first enable SAML for your application, we will leave it in a trial period until given the confirmation to enforce this login method permanently.

Supported Features and Attributes

The Okta/Fathom SAML integration supports SP-initiated SSO and IdP-initiated SSO.

For more information, visit the Okta Glossary.

Supported Attributes

  • email → user.email

  • first_name → user.firstName

  • last_name → user.lastName

  • timezone → user.timezone

Enabling the Integration

  1. Contact your Fathom CSM or the Fathom Support team and request that they enable SAML 2.0 for your Team Edition account. Include the Metadata URL located on the Sign On tab > Sign on methods > SAML 2.0 -> Metadata details with your request.

  2. Provide a list of email domains that will be associated with this Okta instance, if applicable.

  3. Ensure the “Application username format” is set to “Email”.

  4. Fathom will process your request and will provide you with login directions. After receiving this confirmation email, you can start assigning people to the application.

  5. Users can log in through Okta or by going to https://fathom.video/users/sign_in/sso.

Backup URL

Fathom doesn't provide a backup sign-in URL where users can sign in using their regular credentials. You can contact Fathom Support to turn off SAML if necessary.