In this example, we have used Okta as the IdP.  The process should be similar for all IdP providers. 
 
 You need to have access to the admin pages of your IdP. 
 
  The example shows the 
 Okta 
 Classic UI. 
 
 
  -   Log in to the administration interface of your instance of Okta.  
-  Select Applications.  
-   Click Add Application.  
-   Click Create New App.  
    
-   In the Create New Application Integration window, select the following:  
    
    -  Platform - Web  
-  Sign on Method - SAML 2.0  
 
-  Click Create to open the Create SAML Integration wizard.  
-  In the General Settings pane, enter:  
    
    -   App Name - Enter the name you want displayed on the tile for this application in your Okta dashboard.  
-  Optionally, upload an App logo.  
-   Configure the App visibility settings.  
-   Click Next.  
 
-  In the Configure SAML pane, edit the fields shown below with the settings for your Insight server, where <hostname> is the root URL of your Insight server.  
    
    -  In the GENERAL section:  
      
      
       
        
        
       
        
         
         | Field | Value |   
         | Single sign on URL |  https://<hostname>/login/saml2/sso/default  |   
         | Audience URI (SP Entity ID) | https://<hostname>/saml2/service-provider-metadata/default |  
 
 
-  In the ATTRIBUTE STATEMENTS (OPTIONAL) section, use the Add Another button to create the attributes required, then enter or select the following:  
      
      
       
        
        
        
       
        
         
         | Name | Name format (optional) | Value select from options in drop down list |   
         | givenName | Basic | user.firstName |   
         | sn | Basic | user.lastName |   
         | mail | Basic | user.email |   
         | superuser * | Basic | isMemberOfGroupName("<Xpress Insight administrator group name>") |  
 * The superuser attribute should use the Okta Expression Language to derive whether a user is a superuser; The example above returns trueif the user is a member of a specific group. This attribute should be assigned to the Xpress Insight 5 system administrator to provide access to all authority groups.
 
 
 
-   Click Finish. The settings for your configured app are displayed.  
    
-   All of the settings required by Xpress Insight 5 to integrate with Okta are contained in the Identity Provider metadata file, named saml2-idp-metadata.xml. Click the link highlighted in the image above to download and save the file.  
The 
 Identity Provider metadata file created in this section is used to provide Insight with the location of the IdP. The file also contains the IdP certificate that allows 
 Xpress Insight 5 to verify the SAML response originated from the IdP. The next section instructs you how to add this file to 
 Xpress Insight 5. "Okta" means Okta, Inc., and its affiliates and subsidiaries as may be applicable 
 
                 
                
                    © 2001-2021 Fair Isaac Corporation. All rights reserved. This documentation is the
                    property of Fair Isaac Corporation (“FICO”). Receipt or possession of this documentation does not
                    convey rights to disclose, reproduce, make derivative works, use, or allow others to use it except
                    solely for internal evaluation purposes to determine whether to purchase a license to the software
                    described in this documentation, or as otherwise set forth in a written software license agreement
                    between you and FICO (or a FICO affiliate). Use of this documentation and the software described in
                    it must conform strictly to the foregoing permitted uses, and no other use is permitted.