This article provides an overview of how to set up SCIM within the Okta Identity Provider.
Prerequisites
|
Configure SCIM in Okta
- Login to your Okta Org as the Super Admin.
- Go to Applications > Applications > Browse App Catalog.
- Search for SCIM > Click See All Results.
- Select SCIM 2.0 Test App (OAuth Bearer Token) > Add Integration.
- Add an Application label (ex. SCIM 2.0 Templafy App (OAuth Bearer Token)) > Click Next > Click Done.
- Go to Provisioning > Select Configure API Integration > Check Enable API integration.
- Fill out the SCIM 2.0 Base Url and OAuth Bearer Token:
- SCIM 2.0 Base Url format is - https://[templafytenantid].api.templafy.com/v1/scim/.
- The Secret token is available when creating the SCIM API key in the Templafy tenant.
- Click Test API Credentials to verify the configuration > Click Save.
Configure Provisioning Tab
- Within the Provisioning tab, select To App > Edit.
- Check the boxes for Create Users and Update User Attributes > Click Save.
Note
It is not possible to de-provision users with the Okta SCIM application. The reason is that Okta does not perform a delete operation on user objects in the Templafy application.
- Update the Attribute Mappings according to the SAML2 application mappings already configured.
Important
Custom claims should be configured as shown below:
- External name: customClaim4
-
External namespace:
urn:ietf:params:scim:schemas:extension:templafy:2.0:User
Assign Users or User Groups to the SCIM application
- Navigate to the Assignments tab.
- Click Assign.
- Search for the Users or User Groups and assign them to the application.
- The user(s) will be than immediately and automatically synced to Templafy.
Comments
Article is closed for comments.