Set-up SCIM for OKTA
Last updated
Was this helpful?
Last updated
Was this helpful?
Admin access to FenixPyre admin dashboard
SAML SSO is already setup on FenixPyre dashboard
Admin access to Okta portal
Note- During set up, your identity provider will ask for an API token created through the OAuth 2.0 flow.
Follow these steps to configure SCIM in your FenixPyre dashboard and ensure seamless user management:
Sign-in to FenixPyre dashboard:
Open Settings -> Security -> Identity & Provisioning -> SCIM tab.
FenixPyre's SCIM is powered by . Click on Setup SCIM button to redirect to WorkOS setup page.
On the WorkOS setup page, select Okta.
Note
Do not follow the steps in Configure Directory Sync page as it is a outdated. Please follow the steps in this page.
In the General tab Edit the App Settings
In the Provisioning section select SCIM and click on Save.
A new Tab should be visible by the name of “Provisioning”
Navigate back to FenixPyre Dashboard
Copy the Endpoint and bearer token value from the FenixPyre dashboard.
In the Okta Admin portal, navigate to Provisioning -> Integrations.
Paste the copied endpoint value into the SCIM Connector Base URL textbox
Paste the copied bearer token value into the Authorization textbox.
Select the below checkboxes in Supported provisining actions column
Import New Users and Profile Updates
Push New Users
Push Profile Updates
Push Groups
Click on Test Connector Configuration.
If everything is working properly, you should see a success screen confirming the configuration is correct.
Save the changes
Edit the app and enable below options in the Provisionining tab and save the changes again
Return to the FenixPyre Dashboard and click on "Continue to Next Step".
In the "Assign People and Groups to Okta Application" tab, click on "Continue to Next Step" again.
In the "Push Groups" tab, click on "Continue to Next Step" again.
In the "Test directory connection" tab , test the connection and make sure you get a success message
Navigate back to FenixPyre Dashboard and verify that you have Okta configured successfully with Active status as below
Sign-in to your Okta admin portal and open the SAML SSO application you created as part of .