Use these steps to configure custom attribute claims in an Okta SAML single sign-on (SSO) integration so they match Cube’s required configuration.
These steps are completed on the customer’s Okta SAML settings—not in Cube.
Set Custom User Attribute Claims
In Okta, go to Applications > Your App > Single sign-on > SAML.
Scroll to User Attributes and Claims.
Remove any default claims you don’t need.
Default claims often include a
http://namespace.For Cube, remove all claims listed under Additional claims before continuing.
Select Add new claim.
Set Name to the exact claim name required.
Examples
User.FirstNameUser.LastNameUser.EmailAddressemailaddress
Clear the Namespace field completely.
The namespace must be blank.
If left populated, Okta automatically adds a
http://schemas...value, which can cause the claim to fail.
Set Source to Attribute.
Map the claim to the correct Okta user attribute.
Example mappings
Claim name Okta user attribute User.FirstName user.givenname User.LastName user.surname User.EmailAddress user.userprincipalname emailaddress user.mail Select Save.
Repeat these steps for each required claim.
Result
Your Okta SAML configuration now includes the custom attribute claims required for Cube authentication.
If users are unable to sign in after setup, confirm that each claim name matches exactly and that all namespaces are blank. Cube Support can help validate your configuration if needed.