Integration Guides/ Manuals
-
- Integrating HRIS to Enrich Identities & Insights
- Admin Guide: Deploying the Sastrify Chrome Extension
- Admin Guide: Deploying the Sastrify Microsoft Edge Extension
- Manual Installation Guide: Sastrify Chrome Browser Extension
- Manual Installation Guide: Sastrify Edge Browser Extension
- Setting renewal dates & reminders
- Assigning & Modifying Tool Owners
- Uploading & Managing Your SaaS Documents in Sastrify
- Sastrify App Support: Get Help & Give Feedback
- Sastrify's commitment to security and privacy standards
-
- Capturing Subscription Details with Contract AI
- Adding a New Subscription Manually
- Slack Integration: Bringing Sastrify into Your Internal Communication
- How to bulk upload your invoices
- Automating Document Uploads via Email Forwarding
- Managing Your Notification Preferences
- Tools and Spend Importer: Bulk Upload & Visualization
- Align vendor names using the Tool Matching feature
- Sunset or delete inactive subscriptions
-
- Workflows: Automate procurement processes with consistency
- Requests: Streamline procurement process and internal approval
- Get expert procurement support for new purchases and renewals
- How to submit and track Procurement Requests via Jira Integration
- Scope of service: Custom benchmarking & contract review
- Scope of service: Negotiation & renewal support
- Scope of service: Custom SaaS Optimization Advisory
- Purchase your SaaS through the SastriMarket
-
- Connecting Your ERP & Accounting Software
- Spend Import: Validate and fine-tune your imported spend data
- Export spend data from Candis to Sastrify
- Export spend data from Spendesk to Sastrify
- Export spend data from Pleo to Sastrify
- Export spend data from Moss to Sastrify
- Export spend data from DATEV to Sastrify
- Export spend data from Ramp to Sastrify
-
- Configure and manage your authentication settings
- Understanding user roles and permissions
- Configuring Microsoft SSO Authentication for Sastrify
- Configuring Okta SSO Authentication for Sastrify
- Configuring JumpCloud SSO Authentication for Sastrify
- Configuring Cisco Duo SSO Authentication for Sastrify
- Configuring OneLogin SSO Authentication for Sastrify
- Configuring Cloudflare SSO Authentication for Sastrify
- Having trouble logging in?
-
- Okta Discovery and Usage Analytics Integration Guide
- Accounting & ERP: Connecting NetSuite to Sastrify
- Accounting & ERP: How to connect Quickbooks
- Accounting & ERP: How to connect Microsoft Dynamics 365
- Accounting & ERP: How to connect Workday ERP
- Accounting & ERP: How to integrate Pleo with Sastrify
- HRIS: Connecting Officient to Sastrify
-
- ERP & Accounting Integration FAQs
- SSO / IDP Discovery Integration FAQs
- Browser Extension FAQs
- HRIS Integration FAQs
- Usage Analytics FAQs
- Contract AI & Subscription Details FAQs
- Tools and Spend Importer FAQs
- Invoices FAQs
- Achieved Savings FAQs
- Form component guide for Sastrify form builder
- What is SaaS and Sastrify's scope of work?
- Who can invite a new user?
- Who receives the renewal alerts or reminders?
- How does Sastrify work with currencies?
- Is the spend data from accounting export always up-to-date?
- How to work with benchmark prices
- When and how to involve Sastrify in a contract evaluation or negotiation?
- How does Sastrify interact with SaaS vendors?
- How do you handle confidentiality clauses in vendor contracts?
- Why is contract data essential for benchmarking and negotiation support?
Okta Discovery and Usage Analytics Integration Guide Print
Modified on: Wed, 19 Nov, 2025 at 12:32 PM
In this configuration guide, you will learn how to configure Okta integrations for Discovery and Usage Analytics.
For more information on Discovery Integrations and SSO Analytics, please read the following articles:
- Discovery via SSO (Single Sign-On) discovery integrations
- Usage Analytics: Full visibility into usage and cost optimization
IN THIS ARTICLE
- Step 1: Open the Okta integration setup page in Sastrify
- Step 2: Create the Okta app in the Okta admin console
- Step 3: Assign API scopes to the app
- Step 4: Assign the application to users or groups
- Step 5: Check API rate limits
- Step 6: Ensure your refresh Token Access Policy is adequate
- Step 7: Connect the Okta app to Sastrify
Step 1: Open the Okta integration setup page in Sastrify

- Log in to your Sastrify platform.
- Navigate to Integrations > Discovery & Usage.
- Locate the Okta under SSO / IDP.
- A setup page will open, displaying the required configuration details and input form.
Step 2: Create the Okta app in the Okta admin console
Log in to your company’s Okta Admin Console using an administrator account.
Go to Applications and click Create App Integration.
Choose OIDC - OpenID Connect—as the sign-in method.
Select Web Application as the application type and click Next.

Name the app (e.g., Sastrify Okta Integration).
Under Grant Types, select both Authorization Code and Refresh Token.

In the Sign-in Redirect URI field, enter the following callback URls:
Click Save and Continue.
Step 3: Assign API scopes to the app

- Navigate to Security > API > Authorization Servers.
- Select your default authorization server.
- Go to the Okta API Scopes tab.
- Ensure that you have enabled the following scopes by clicking the Grant button next to each one.
- okta.users.read
- okta.logs.read
- okta.apps.read
In addition to the above, the following scope will automatically be assigned to you in the app by default.
- openid
- profile
- offline_access
Step 4: Assign the application to users or groups

Open the app you just created.
Go to the Assignments tab.
Assign the app to at least one user or group.
Note: This step is required for the integration to function properly.Step 5: Check API rate limits

Ensure the app’s API rate limits are sufficient:
Okta returns up to 200 users per call.
Sastrify may send up to 50 requests per minute per API during syncs.
Plan for at least:
<Your number of employees> ÷ 200requests per minute.Adjust the limits as needed to avoid throttling.
Step 6: Ensure your refresh Token Access Policy is adequate
- By default, Okta requires reauthorization every 90 days to prevent indefinite access to your resources.
- If you're fine with this default and haven't defined custom access policies, you can skip this step.
- To change the reauthorization period, configure a custom access policy:
Okta Console > Security > API > click on the Default Authorization Server > Access Policies > Add New Access Policy - Follow the steps in the screenshots below to configure the policy.
- Sastrify will prompt you to reconnect and reauthorize data access based on the configured refresh token lifespan.

Step 7: Connect the Okta app to Sastrify

Return to the Okta setup form in your Sastrify platform.
Enter your Okta subdomain (e.g.,
yourcompany.okta.com).Input the Client ID and Client Secret from the Okta app.
Enable usage analytics by toggling "Enable usage analytics tracking" to the "active" position.
Click Connect.
You will be redirected to Okta to log in and authorize access.
After logging in, you'll be redirected back to Sastrify.
Once connected, Sastrify will begin syncing data automatically. Any discovered tools not already in your stack will appear in the Radar view. For a detailed article on Sastrify Radar, follow this link.
Did you find it helpful? Yes No
Send feedback