Table of Contents
Configuring SCIM for Okta on Simpplr
Adding Standard and Custom Attributes
Disconnect Okta SCIM from Simpplr
Overview
SCIM (System for Cross-domain Identity Management) is a standardized protocol that automates the provisioning and de-provisioning of users between Okta and external applications. By setting up SCIM in Okta, organizations can ensure efficient user management, improve security, and maintain consistency across integrated applications.
Prerequisites
Before setting up SCIM in Okta, ensure the following:
-
Administrator access to Okta
-
The target application must support SCIM
-
SCIM API credentials (Base URL and API token) from the target application (Retrieval steps below)
Configuring SCIM for Okta on Simpplr
You'll need to access your Simpplr app first as the Application manager.
- In Simpplr, from your user profile image, click Manage > Application > Integrations > People Data.
- Under SCIM Sources, click Add integration, then select Okta.
-
Enter a unique name for the integration (e.g., Okta SCIM). Note that duplicate names are not allowed.
-
Click Add, which will take you to the newly added integration screen.
-
Click Generate token. This will display two key configurations:
-
SCIM Base URL: The endpoint URL used by the vendor to make API calls for testing connection, provisioning and syncing.
-
Token: The authentication token that Simpplr uses to validate incoming requests from the vendor for provisioning and sync operations.
-
- Copy and save both these generated points somewhere you can easily remember. You'll need them later on.
Configure Okta for SCIM
-
Open the Okta developer console. You will need administrator access to complete the next steps.
-
In the left hand, click on Applications. Now either select an existing application or create one.
-
To create a new application:
-
From the Applications page, click on Create App Integration.
-
Select SAML 2.0 and click Next.
-
Enter the desired App name and click Next.
-
Add dummy url values since you're only setting up SCIM.
-
Select EmailAddress in Name ID format & Email in Application username.
*In the case of migration from your old Salesforce Simpplr platform to the new AWS platform, the application username will be retained from the previous Salesforce app.
-
Scroll down and click Next.
-
From the next screen, select This is an internal app that we have created and then Finish.
-
-
In the General tab, click Edit in the App Settings section.
-
Check Enable SCIM provisioning.
-
Click Save.
-
The page will reload and then you will see a provisioning section in the top. Click on the Provisioning tab.
-
From SCIM Connection, click Edit.
-
SCIM connector base URL - The SCIM Base URL retrieved from Simpplr App while setting up SCIM.
-
In Unique identifier field for users, enter
email
. -
In supported provisioning actions, select appropriate options (preferred to select: Import New Users and Profile Updates, Push New Users, Push Profile Updates).
-
From the Authentication Mode dropdown, select HTTP Header & paste the authentication token retrieved from Simpplr.
-
-
Click Test Connector Config. On successful connection, you will get the below message:
-
Close and click Save.
-
Under the Provisioning tab, in the To App section, click Edit.
-
Under Provision to app section, enable the required options:
-
Create Users
-
Update User Attributes
-
Deactivate Users
-
-
Scroll down and click on Save.
Create Role Field in Okta Profile
-
To create the role field for user object in Okta, click on profile editor on the left-side nav bar.
-
Click Okta in the Filters list.
-
For Okta User (default), click Profile. If Profile is unavailable, click User (default).
-
Click on Add Attribute.
-
Fill the form with the following values:
-
Data type: String
-
Display name:
Role
-
Variable name:
role
-
Description:
Simpplr application user roles
(Preferred) -
Select
Define enumerated list of values
in Enum section. -
In Attribute members, enter the following:
-
Display name :
End User
, Value :End User
-
Display name :
Application Manager
, Value :Application Manager
-
-
Attribute Required: Yes
-
-
Click Save.
-
Go back to Applications in the Applications section in the left sidebar.
-
Select the newly created application. Go to the Provisioning tab, and from the To App section, scroll down and click Go To Profile Editor.
Note:
The username in the above screenshot is mapped to the field that was setup in the Sign On settings. Please ensure that the field (Application username field) is set to email instead of username as the Okta username is not always the same as the email setup in user profile. -
Here we will map the previously created role field to the application. To do this, click on Add Attribute button.
-
Fill the form with the following values for creating role attribute:
-
Data type: String
-
Display name:
Role
-
Variable name:
role
-
External name :
roles.^[primary==true].value
-
External namespace :
urn:ietf:params:scim:schemas:core:2.0:User
-
Description:
Simpplr application user roles
(Preferred) -
Select
Define enumerated list of values
in the Enum section. -
In Attribute members, enter the following:
-
Display name :
End User
, Value :End User
-
Display name :
Application Manager
, Value :Application Manager
-
-
Attribute Required: Yes
-
Attribute type: Group
-
-
Click Save.
-
Click on Mappings in the same page.
-
In the first tab, find the role in right column. In the corresponding left column, select
appuser.role
. -
Click on Save Mappings and then click on Apply Updates Now.
-
Again click on mappings.
-
Now click Okta user to <your application name>.
-
Find the role on right-hand side. In the corresponding left column, select
user.role
. -
Click Save Mappings, then Apply Updates Now.
Adding Standard and Custom Attributes
-
-
From the Okta SCIM app, select Provisioning, click on Go to Profile Editor, and then click on Add Attribute.
-
In External namespace add everything before the final colon.
-
In External name add the text after final colon.
For example if the field mapping is:
urn:ietf:params:scim:schemas:extension:simpplrapp:User:pronouns
then External Namespace would be:
urn:ietf:params:scim:schemas:extension:simpplrapp:User
External Name would be pronouns
-
If the field mapping is:
urn:ietf:params:scim:schemas:extension:simpplrapp:66886f53-e818-46cc-b25d-25162482afbc:User:9754a987-7700-4177-ba4b-22219d99cd9d
External Namespace would be:
urn:ietf:params:scim:schemas:extension:simpplrapp:66886f53-e818-46cc-b25d-25162482afbc:User
External Name would be:
9754a987-7700-4177-ba4b-22219d99cd9d
-
Now we will add mobile number field in Okta. Once again, click Add attribute.
-
Fill in the form with the following data:
-
Data type: String
-
Display name:
mobile
-
visible name:
mobile
-
External name :
phoneNumbers.^[type==mobile].value
-
External namespace :
urn:ietf:params:scim:schemas:core:2.0:User
-
Description:
Mobile number of the user
(Preferred)
-
-
Click Save.
-
Click Mappings.
-
Go to the second tab )i.e. Okta user to <your application name>).
-
Find the mobile in right column and select
user.mobilePhone
in the left column. -
Click on Save Mappings, then Apply Update Now.
-
Now to assign or to provision using SCIM, navigate to your application.
-
Click on Assignments.
-
Click Assign.
-
Select Assign to People.
-
Select the person and click Assign, then Save, then Done.
-
Refresh the page. If there is no red symbol on the user you have assigned, it means the provisioning is successful.
-
You can click on View logs from the application homepage to see the failure log if the assignment fails.
Disconnect Okta SCIM from Simpplr
To disconnect Okta SCIM, follow the steps below:
-
-
Go to Simpplr. Click on Manage > Applications > Integrations > People data.
-
Select the SCIM source, click on the three dots and click on Delete.
-
Go to the Okta developer console.
-
Click on Applications in the Application section from the left sidebar, then click General.
-
In the App Settings section, click Edit.
-
Uncheck Enable SCIM provisioning in the Provisioning section.
-
Click Save, then click Remove Provisioning.
-
Comments
Please sign in to leave a comment.