This article describes the setup and integration steps to connect your Single-Sign-On account at Okta to Fabric, allowing you to enjoy the benefits of easy sign-in, as well as authentication and authorization control through your admin tools.
Log in to the Okta Admin console as an Admin.
In the Admin Console, go to Applications > Applications via the left navigation bar.
At the Applications page, click ‘Browse App Catalog’ .
![]() |
At the Browse App Integration Catalog page, search for "Fabric by K2View" via the search box and select it.
![]() |
On the Fabric by K2View app page, click 'Add'.
![]() |
On the next page, click 'Done'. The app is created and is ready to configure the specific deployment setup.
![]() |
Assign users or groups to the application, via the Assignments tab, by using the 'Assign' button. Assigning groups assigns the users associated with those groups.
![]() |
Complete the SAML SSO configuration, via the Sign On tab, by clicking on 'Edit' and filling in the relevant fields. Once done, click 'Save'.
groups - at the select list choose "Matches regex" and fill ".*" in the form field.
Encryption Certificate - browse to the public key certificate used to encrypt the SAML assertion, as exported from Fabric. Then click on 'Upload'. Read here more about the Fabric certificate file.
ACS URL - as provided by the Fabric team. It should resemble the following pattern: "https://< fabric-external-domain-name >:< port >/api/authenticate".
Audience URI (SP Entity ID) - the intended audience of the SAML assertion. This is the Fabric Entity ID. It should be similar to this pattern: "https://< fabric-external-domain-name >".
Application username format - at the select list choose "Email".
![]() |
At the "Sign On" tab, click on "View Setup Instructions".
![]() |
A new browser tab will open with the information that should be copied to the Fabric configuration (IDP URL and IDP issuer/entity ID) and the certificate key to be uploaded into Fabric, for signing the authentication requests.
![]() |
This article describes the setup and integration steps to connect your Single-Sign-On account at Okta to Fabric, allowing you to enjoy the benefits of easy sign-in, as well as authentication and authorization control through your admin tools.
Log in to the Okta Admin console as an Admin.
In the Admin Console, go to Applications > Applications via the left navigation bar.
At the Applications page, click ‘Browse App Catalog’ .
![]() |
At the Browse App Integration Catalog page, search for "Fabric by K2View" via the search box and select it.
![]() |
On the Fabric by K2View app page, click 'Add'.
![]() |
On the next page, click 'Done'. The app is created and is ready to configure the specific deployment setup.
![]() |
Assign users or groups to the application, via the Assignments tab, by using the 'Assign' button. Assigning groups assigns the users associated with those groups.
![]() |
Complete the SAML SSO configuration, via the Sign On tab, by clicking on 'Edit' and filling in the relevant fields. Once done, click 'Save'.
groups - at the select list choose "Matches regex" and fill ".*" in the form field.
Encryption Certificate - browse to the public key certificate used to encrypt the SAML assertion, as exported from Fabric. Then click on 'Upload'. Read here more about the Fabric certificate file.
ACS URL - as provided by the Fabric team. It should resemble the following pattern: "https://< fabric-external-domain-name >:< port >/api/authenticate".
Audience URI (SP Entity ID) - the intended audience of the SAML assertion. This is the Fabric Entity ID. It should be similar to this pattern: "https://< fabric-external-domain-name >".
Application username format - at the select list choose "Email".
![]() |
At the "Sign On" tab, click on "View Setup Instructions".
![]() |
A new browser tab will open with the information that should be copied to the Fabric configuration (IDP URL and IDP issuer/entity ID) and the certificate key to be uploaded into Fabric, for signing the authentication requests.
![]() |