• July 27, 2025
  • Written by: naxslabs
  • No Comments

You may need to provide access to applications to users in a different Okta organization. This method utilizes the Okta Org2Org application with SAML 2.0, and Dropbox Business as an example.


Prerequisites / Requirements

  • Two Okta Organizations: The org2org application can’t be installed on developer accounts. Therefore, you need a developer account to be the service provider and a paid or partner account to be the identity provider.
  • An application to provide access to.

Step-by-Step Instructions

Step 1: Service Provider Application

Navigate to Applications, Browse App Catalog, search for Dropbox Business, and add the integration. From there, return to Applications and select Dropbox Business to initiate the configuration. In the General tab, enter a name for the application and save. Next, go to the Sign-on tab and retrieve the Sign-on URL and the Signing Certificate to configure Dropbox.

Sign in to the Dropbox Admin console and go to the security tab to update the certificate and paste the sign-in URL.

In Okta, review the advanced sign-on settings, as well as the settings for silent provisioning and credential details. You’ll likely want silent provisioning enabled, and the Okta username and Create and Update selected. On the provisioning tab, select ‘To App‘ and enable the ‘Create User’, ‘Update Attributes’, and ‘Deactivate Users’ options.

You can verify Dropbox account provisioning by going to the assignments tab and assigning a user or group. Log in as your test user and click the Dropbox tile on the end user dashboard.

Step 2: Configure an Identity Provider

To allow users from another organization to use the Dropbox app, you have to configure an identity provider. The tenant that hosts the Dropbox application (Service Provider) needs to create a trust relationship with the organization that manages the identities (IdP). Go to Security, then Identity Providers, select SAML 2.0 from the list, and click Next.

The next step requires information from the identity provider. Log in to that tenant and install the Okta Org2Org application. Go to Applications, then Browse Application Catalog, search for “org2org,” and add the integration. The Org2Org application requires a Base URL, which is the address of the Service Provider.

On the next screen, click More Details to view the Issuer URI, Sign-on URL, and download the Signature Certificate. This information is used in the SAML 2.0 configuration back on the Service Provider. My configuration for the SAML 2.0 settings is:

  • Name = Org1 IDP
  • IdP username = idpuser.subjectNameId
  • Match against = Okta Username
  • Enable Automatic Linking = True
  • Create New User (JIT) = True
  • Apply the IdP Issuer URL, Sign On URL and Certificate that you got from the Okta Org2Org application. Leave everything else at their defaults.

Click finish to view the Assertion Consumer Service URL and Audience URI and configure them in the Okta Org2Org app on the Identity Provider.

Next, we need to configure provisioning so that user states get synced to the Service Provider. Obtain an API key from the Service Provider by navigating to Security, then API, and then Tokens. Create a token and copy it into the Okta Org2Org settings under Provisioning and Integration.

Next, navigate to “To App” and enable Create Users, Update User Attributes, and Deactivate Users. Finally, go into the Assignments tab and assign a user or group to Okta Org2Org. Log in as that user and click the Org2Org tile on their user dashboard to verify provisioning at the Service Provider. Assuming that worked, assign that user (or group) to the Dropbox Business application over on the Service Provider.

Step 3: Single Sign On

In this scenario, Sarah logs in to her user dashboard at Org1, which serves as the Identity Provider. Once there, she clicks on the Okta Org2Org tile and is directed to the Service Provider’s login page, where she will enroll in any required authenticators.

Once she’s logged into the Service Provider, Sarah clicks the Box Business tile and joins the Dropbox Team. There are a few first-time confirmations that she has to go through, but she eventually gets signed into Dropbox.

Leave a Reply

Your email address will not be published. Required fields are marked *