Okta SCIM Provisioning

Okta's SCIM is another great option to minimize user management on top of SSO by provisioning your employees to OfficeRnD Hybrid without the need to manually create or import each one of them here. This way you can manage users in Okta and every update there will be synced to our platform. 

Table of Contents

Important

  • We recommend managing and editing employees only in your Active Directory.
  • During the initial configuration of the SCIM integration in Okta, Teams from OfficeRnD will be pulled and Groups for them will be created into Okta. These groups can’t be deleted. Please be mindful of that and ensure you have no Teams in OfficeRnD that shouldn’t be created in Okta.
  • OfficeRnD supports a multi-team structure - one employee can be part of several teams. The first synced Okta group will be their Primary team. If they are part of other groups you decide to provision, they will be assigned to the person as additional teams. mceclip0.png
  • Please bear in mind that if an employee leaves the company and their profile is deleted from the Active Directory, they will not be deleted from OfficeRnD Hybrid but will be labeled as Former. If they had any bookings in the system, they will be kept as well. Any future bookings of the said employee must be canceled manually.

Enable SCIM in OfficeRnD

Set up SSO with one of the supported options listed here. SCIM cannot be configured without it.

  1. Navigate to Settings/Integrations and click Configure on your existing SSO Authentication integration.
  2. Check the Enable SCIM option.
  3. Click Update.

mceclip1.png

Set up SCIM in Okta

  1. Open your Okta Workspace account as an Administrator and navigate to Applications.
  2. Click Browse App Catalog and search for SCIM.
  3. Select SCIM 2.0 Test App (Header Auth) from the available options.
  4. Click Add Integration.
  5. Disable Browser plugin auto-submit and click Next.
  6. In the Sign-in Options select Secure Web Authentication.
  7. Check the option that is meaningful to your internal policies.
  8. Click Done.scim1.gif
  9. Switch to the Provisioning tab inside the SCIM app interface.
  10. Click Configure API Integration and check Enable API integration.
  11. Open your OfficeRnD, navigate to Settings/Integrations and click Configure on your existing SSO integration.
  12. Copy the SCIM Base URL and paste it into Okta's Base URL field.
  13. Back to OfficeRnD, click to reveal the SCIM Secret and copy the value.
  14. Paste it in Okta's API Token field and key in Bearer in front of the copied value (e.g Bearer xxxxxxxxxxxxxxxx)
  15. In OfficeRnD, click Update in the SSO/SCIM configuration pop-up.
  16. Now back to Okta, click Test API Credentials. If you have followed the steps, the app will be verified successfully.
  17. Hit Save.scim12.gif
  18. Once this is done, you have to configure the provisioning from okta --> SCIM, e.g how the sync should work and create Okta users in OfficeRnD. Only a one-way sync is supported for the time being.
    1. Click Edit.
    2. Enable Create Users.
    3. Enable Update User Attributes.
    4. Enable Deactivate Users.
    5. Sync Passwords is not needed.
    6. Hit Save.Capture.JPG
  19. Switch to SCIM --> okta and make sure Profile & Lifecycle Sourcing is Disabled.mceclip3.png

SCIM is now ready and you can use Okta's functionalities to start provisioning your users to OfficeRnD Hybrid

  1. Switch to the Assignments tab in your SCIM application - here you can Assign all Groups whose Users should be synced. This will begin syncing the users in Okta as Employees in OfficeRnD
  2. Next, switch to Push Groups tab - here you select which Groups will be created in OfficeRnD as Teams. Doing so will begin syncing the Teams in OfficeRnD and will assign the employees in their respective teams.scim123.gif
Was this article helpful?
3 out of 3 found this helpful

Comments

0 comments

Please sign in to leave a comment.