Login into Okta account using assigned the domain name of your account. You can find your Okta domain name from the activation email (for my case, it was: https://dev-580341.okta.com/login/login.htm). you may have to click on the Admin button depending on how Okta authenticates.
If you are using the Developer Console, you need to first switch to the Classic UI console. If you see Developer Console on the top left of the page, click on it and select Classic UI to switch.
Select People from the Directory menu, and then click on Add Person button.
Fill up the form based on the below picture. Enter firstname.lastname@example.org for the username field. Go to the Password option and select Set by admin from the drop-down and enter Password1! as a password. Uncheck the option User must change password on first login and click on Save button. We will use to authenticate and authorize AWS Lake Formation tables and columns for fine-grain access.
Go to Applications from the menu and click on Add Application button. Select Create New App from the left.
In the Create a New Application Integration dialog box, select Web as the platform and select SAML 2.0 as the Sign on method and click Create.
On the General Settings page, enter a name Lake-Formation as the App name and then click Next.
On the Configure SAML page, fill up the form based on the following information:
Copy and paste the following URL into the Single sign on URL field:
Click Next. In the Feedback tab, select I'm an Okta customer adding an internal app. The section expands and displays more options. Select This is an internal app that we have created as the App type. Click on Finish.
Click on the Assignments tab.
Click Assign and then select Assign to People.
Click on Assign button next to the user emr-developer you created earlier.
On the next screen, change the username to just emr-developer only and click Save and Go Back button.
Verify all the information for the Lake-Formation application.
Go to the Sign On tab on the Lake-Formation application. In the SIGN ON METHODS section, locate the Identity Provider metadata link. Download the metadata file using the link and store it in your laptop.