This document explains the process to enable SSO for DeepSource using SAML 2.0 with Okta as the Identity Provider (IdP).
For now, an admin (on Okta) needs to create a custom SAML integration for DeepSource Enterprise. The steps for which are as given:
On the left sidebar, choose "Applications" → "Applications", and click on "Create App Integration".
Choose "SAML 2.0" and click "Next".

Fill in the following details:

| Field | Value |
|---|---|
| App Name | DeepSource Enterprise Server |
| App Logo | Upload this logo and click "Next" |
Assuming that DeepSource is hosted on "https://deepsource.foobar.com", fill in the following details accordingly:

| Field | Values |
|---|---|
| Single sign on URL | https://deepsource.foobar.com/saml2/acs/ |
| Audience URI (SP Entity ID) | https://deepsource.foobar/saml2/metadata/ |
| Name ID format | EmailAddress (choose from drop down) |
| Application username | Email (choose from drop down) |
In "Attribute Statements", add the following:

| Field | Name format | Value |
|---|---|---|
| first_name | Basic |
user.firstName |
| last_name | Basic |
user.lastName |
Under Feedback selection, choose:
On the next screen, go to the “SAML Signing Certificates” section. Copy the link for "Identity Provider Metadata" by clicking on Actions -> View IdP metadata for the “SHA-2 Type” certificate.

<aside>
💡 It should be in the following format: https://<customer>.okta.com/app/<app-slug>/sso/saml/metadata
</aside>
Once SAML has been configured on Azure AD, navigate to “Config” tab in the Admin panel (replicated Kotsadm):