< All Topics

Share Files from Azure File Storage with Okta Users using SSO

Share files from Azure File Storage with Okta users using SSO in a simple manner with the aid of NirvaShare, which is a secure file sharing and access management software. Additionally, NirvaShare also supports multiple other identity providers like ActiveDirectory, Google Workspace, Keycloak etc. Using this detailed guide, we can configure Okta identity provider using NirvaShare to share and manage access for Azure files.


As a prerequisite for Azure storage file sharing with Okta users, you should install NirvaShare and configure its storage. You can follow the below procedure for installation provided in any one of the following documents.

The below document can assist you in configuring the storage.

Login Profile Creation

To enable SSO with Okta identity provider for Azure file sharing, a login profile in NirvaShare should be created. The below mentioned steps will guide you to create one. 

    • Login to Admin Console of NirvaShare.
    • On the left menu of the admin console, click on login profiles.
    • Click on CREATE button located in the top right corner of the page.
    • Provide a name for the title.
    • For the Authentication, select External Single Sign On (SSO) and click on CREATE.
    • This will create a new Login Profile.
Backblaze B2

Note – For IP access restriction, refer to Access restriction with IP Address to restrict access to only certain white listed IP addresses or a range.

ACS and Entity ID

In the future steps, while configuring Okta, you will require ACS and Entity Id URL, hence please make a note of these two URLs. These two URLs can be obtained by editing the newly created login profile.


Okta Configuration

To integrate NirvaShare with Okta, a SAML application has to be created in Okta and the steps mentioned below should be followed

  • Sign into Okta console as an administrator.
  • Now go to Applications on the left side of the menu and click on Applications in the Okta console.
  • Click on Create App Integration.
  • In the pop-up page for Sign-In method, select SAML 2.0.
  • Click on Next.

Note – For more information, you can also refer to Okta Documentation.

  • Give the app a name of your choice.
  • Select a logo (optional).
  • Click on Next.
  • The next screen will ask for ACS and Entity Id URLs of Nirvashare obtained in the previous section.
  • Enter ACS URL in the Single Sign On URL field and select the option to ‘Use this for Recipient URL and Destination URL’.
  • Enter the Entity Id URL into the Audience URL field, this URL contains the SAML metadata of the NirvaShare login profile.
  • Leave the attribute statements (optional) field blank.
  • Scroll to Group attribute statements.
  • Type in member in the Name field, choose basic in the Name format drop down, Matches regex in the filter drop down and key in “ .* ” in the filter field.
  • Click on Next to move onto the feedback section.
  • In the feedback section, select the option that says ” I’m a Okta customer adding an internal app ” and also check the option  “This is an internal app that we have created”.
  • Now click on Finish.
  • Click on the Assignment tab in the next screen.
  • Assign one or more users to this app by clicking on the Assign drop down.
  • In the next step,click on Sign On tab.
  • Clicking on Copy, you will get the link of Okta metadata URL.
okta metadata2
  • Go to a new browser tab and open the Okta metadata URL.
  • Save the the XML file locally by right clicking on the URL.
  • The downloaded external IDP metadata file will have to be updated in the NirvaShare Login Profile.

Updating Login Profile with Okta SAML Metadata

The SAML metadata file obtained from the above process through Okta should be updated in the login profile in NirvaShare. Here we have listed the steps to do it.

  • Login as an administrator into admin console of NirvaShare.
  • Go to left menu of admin console and click on Login profiles.
  • Edit the Login profile that we created earlier.
  • In the Authentication section click on the browse button and select the metadata file for the External IDP SAML Metadata section.
  • Click on Update.


After all these steps, we can finally use SSO with Okta. For this let us create a folder share and enable SSO. Refer to the document mentioned below to create a new share from Storage. But remember to select the login profile we created in the above section during the process of sharing. You can create one or more shares as well and assign the same login profile.

Creating Share


  • In the admin console of NirvaShare, click on Login Profiles from left menu.
  • Right click on the login profile that we created and select Copy Shareable Link.
  • Open the link in a browser and this will redirect to Okta for SSO.

Once you complete the authentication, you can access Shares assigned to the login profile.​

okta final
Table of Contents