Hi @ankur
To add the Snowflake application in Okta, you should use the Add Custom SAML App API as described here.
Here is a cURL example for this request
curl -X POST \
https://org.okta.com/api/v1/apps \
-H 'Accept: application/json' \
-H 'Authorization: SSWS API_TOKEN_HERE' \
-H 'Content-Type: application/json' \
-d '{
"label": "Custom Saml 2.0 App",
"accessibility": {
"selfService": false,
"errorRedirectUrl": null,
"loginRedirectUrl": null
},
"visibility": {
"autoSubmitToolbar": false,
"hide": {
"iOS": false,
"web": false
}
},
"features": [],
"signOnMode": "SAML_2_0",
"credentials": {
"userNameTemplate": {
"template": "${fn:substringBefore(source.login, \"@\")}",
"type": "BUILT_IN"
},
"signing": {}
},
"settings": {
"app": {},
"notifications": {
"vpn": {
"network": {
"connection": "DISABLED"
},
"message": null,
"helpUrl": null
}
},
"signOn": {
"defaultRelayState": "",
"ssoAcsUrl": "http://example.okta.com",
"idpIssuer": "http://www.okta.com/${org.externalKey}",
"audience": "https://example.com/tenant/123",
"recipient": "http://recipient.okta.com",
"destination": "http://destination.okta.com",
"subjectNameIdTemplate": "${user.userName}",
"subjectNameIdFormat": "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress",
"responseSigned": true,
"assertionSigned": true,
"signatureAlgorithm": "RSA_SHA256",
"digestAlgorithm": "SHA256",
"honorForceAuthn": true,
"authnContextClassRef": "urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport",
"spIssuer": null,
"requestCompressed": false,
"attributeStatements": []
}
}
}'
The values for settings.signOn are the ones provided by Snowflake.
Regarding the replication through adding the Snowflake app manually, are you referring to adding the application directly from Okta Integration Network? If this is the case, then unfortunately we do not have a public API in order to achieve the same result.