Articles in this section

How to set up SCIM with Okta

About this article

This article provides an overview of how to set up SCIM within the Okta Identity Provider.

Prerequisites

 
  • SAML2 application configured
  • Owner access to Templafy tenant
  • Super Admin rights in the Okta tenant
  • Public API module enabled

 

Configure SCIM in Okta

  1. Login to your Okta Org as the Super Admin.
  2. Go to Applications > Applications > Browse App Catalog
  3. Search for SCIM > Click See All Results
  4. Select SCIM 2.0 Test App (OAuth Bearer Token) > Add Integration



  5. Add an Application label (ex. SCIM 2.0 Templafy App (OAuth Bearer Token)) > Click Next > Click Done



  6. Go to Provisioning > Select Configure API Integration > Check Enable API integration
  7. Fill out the SCIM 2.0 Base Url and OAuth Bearer Token
    • SCIM 2.0 Base Url format is - https://[templafytenantid].api.templafy.com/v1/scim/
    • The Secret token is available when creating the SCIM API key in the Templafy tenant
 

 

8. Click Test API Credentials to verify the configuration > Click Save

 

 

Configure Provisioning Tab

  1. Within the Provisioning tab, select To App > Select Edit
  2. Check the boxes for Create Users and Update User Attributes > Click Save



 
  • Please note, it is not possible to de-provision users with the Okta SCIM application. The reason is that Okta does not perform a delete operation on user objects in the Templafy SCIM application.


3. Update the Attribute Mappings according to the SAML2 application mappings already configured

 

Assign Users or User Groups to the SCIM application

  1. Navigate to the Assignments tab
  2. Click Assign
  3. Search for the Users or User Groups and assign them to the application
  4. The user(s) will be than immediately and automatically synced to Templafy

 

 

Related articles

 

 

scim okta
Was this article helpful?
0 out of 0 found this helpful

Comments

0 comments

Article is closed for comments.