How to enable Okta for SCIM provisioning

πŸ§ͺ Preview feature! This feature is available for your experimentation, and we'd love your feedback. It may change before its final generally-available form. If you'd like to participate in the preview, reach out to your customer success manager for more information.

You can automate the process of provisioning and deprovisioning your Okta users and groups in Atlan with System for Cross-domain Identity Management (SCIM).

To enable Okta for SCIM provisioning, complete the following steps.

πŸ’ͺ Did you know? For any questions about SCIM provisioning, head over here.

Prerequisites

Retrieve SCIM token in Atlan

πŸ€“ Who can do this? You will need your Atlan admin to complete these steps β€” you may not have access yourself. You will also need inputs and approval from your Okta administrator.

 You will need to generate a SCIM token in Atlan for authentication in Okta.

To retrieve the SCIM token, from within Atlan:

  1. From the left menu on any screen, click Admin.
  2. Under the Workspace heading, click SSO.
  3. On the Single Sign on page for Okta, under Overview, navigate to Automate Provisioning with SCIM and toggle it on.
  4. Under SCIM token, click the + Generate token button to create a SCIM token.
  5. In the SCIM token generated dialog, click the Copy button to copy the SCIM token and store it in a secure location.
🚨 Careful! The SCIM token will only be displayed once after it has been generated, you cannot retrieve it later.

Enable SCIM provisioning in Okta

πŸ€“ Who can do this? You will need your Okta administrator to complete these steps β€” you may not have access yourself. You will also need inputs and approval from your Atlan admin.

You can enable SCIM provisioning in Okta to automatically sync your users and groups to Atlan.

Configure SCIM provisioning in Okta

To configure SCIM provisioning, from within Okta:

  1. Log in to your Okta admin console.
  2. From the menu on the left, expand the Applications menu and then click Applications.
  3. Under Applications, click Browse App Catalog and select the SAML application you created to configure SSO in Atlan.
  4. From the tabs along the top of your application page, click the General tab and then click Edit.
  5. Under App Settings, for Provisioning, click SCIM and then click Save to confirm.
  6. From the tabs along the top of your application page, click the Provisioning tab and then click Edit.
  7. For SCIM connection, enter the following details:
    1. For SCIM connector base URL, enter your Atlan tenant URL in the following format β€” https://<your-tenant-dns>/api/service/scim/.
    2. For Unique identifier field for users, enter userName as the field name of the unique identifier for your users on your SCIM server.
    3. For Supported provisioning actions, click to enable the following provisioning actions:
      • Import New Users and Profile Updates β€” this allows Okta to import new users and user profile updates to Atlan.
      • Push New Users β€” this allows user information to flow from Okta to Atlan.
      • Push Profile Updates β€” this allows profile information to flow from Okta to Atlan.
      • Push Groups β€” this allows group information to flow from Okta to Atlan.
      • Import Groups β€” this allows Okta to import new groups and group profile updates to Atlan.
    4. For Authentication Mode, click the dropdown and then select HTTP Header.
    5. To authenticate using HTTP Header, you will need to provide a bearer token that will provide authorization against Atlan. For Authorization, in the Token field, enter the SCIM token you copied in Atlan.
    6. Click the Test Connector Configuration button to confirm connectivity to Atlan.
    7. Once successful, at the bottom of the form, click Save to save the configuration.
  8. Under the left Settings menu of the Provisioning tab, two new tabs will appear β€” To App and To Okta. Click To App to configure settings for SCIM provisioning to Atlan.
  9. For Provisioning to App page, click Edit and then click to enable the following:
    • Create Users β€” assigns a new Atlan account to each user managed by Okta. Okta does not create a new account if it detects that the username specified in Okta already exists in Atlan. The user's Okta username is assigned by default.
    • Update User Attributes β€” updates the user profiles of users assigned to Atlan. Profile changes made in Atlan will be overwritten with their respective Okta profile values.
    • Deactivate Users β€” automatically deactivates user accounts when they are unassigned in Okta or their Okta accounts are deactivated. Okta will also reactivate the Atlan account if the app integration is reassigned to a user in Okta.
  10.  Click Save to save the configuration.

Map Okta user attributes to Atlan

🚨 Careful! You will need to assign users to Atlan from Okta before you can provision them.

After you have enabled SCIM provisioning and assigned users to Atlan in Okta, you can provision them to Atlan. Note the following:

  • The username and email address of new and existing users cannot be changed once users have been provisioned to Atlan.
  • If provisioning any users that already exist in Atlan, ensure that their Okta credentials match the existing credentials in Atlan for provisioning to be successful.

To provision users to Atlan, from within Okta:

  1. Log in to your Okta admin console.
  2. From the menu on the left, expand the Directory menu and then click Profile Editor.
  3. On the Profile Editor page, in the left menu under Users, click Apps and select the SAML application you created to configure SSO in Atlan.
  4. On your application page, under Attributes, click Mappings.
  5. In the User Profile Mappings dialog box, click Okta User to App.
  6. In the Okta User to App page, userName is already set by Atlan. Define the following mappings from Okta on the left to Atlan on the right:
    • user.firstName β€”> givenName
    • user.lastName β€”> familyName
    • user.email β€”> email
  7. Click Save to save your selections.
  8. Once saved, at the bottom of the dialog, click Apply updates now.
  9. (Optional) Navigate to the Provisioning tab of the SAML application you created to configure SSO in Atlan to confirm the attribute mappings.

Enable group push in Okta to Atlan

🚨 Careful! You will need to configure group mapping in Atlan before you can enable group push from Okta to Atlan.

To enable group push to Atlan, from within Okta:

  1. Log in to your Okta admin console.
  2. From the menu on the left, expand the Applications menu and then click Applications.
  3. Under Applications, click Browse App Catalog and select the SAML application you created to configure SSO in Atlan.
  4. From the tabs along the top of your application page, click the Push Groups tab and then click Edit
  5. Under Push Groups to App, click the settings icon. From the Group Push Settings dialog, click Rename app groups to match group name in Okta and then click Save to rename groups in Atlan when linking groups.
  6. Under Push Groups to App, click the Push Groups button and then select Find groups by name to push your Okta groups to Atlan:
    1. For Push groups by name, in the Enter a group to push... field, enter the name of an Okta group you want to push to Atlan.
    2. To the right of your selected Okta group, under Match result & push action, click the Create Group dropdown and then select Link Group.
    3. Click Save to save your selections.
    4. (Optional) Repeat steps 1 to 3 to push additional Okta groups to Atlan.

Related articles

Was this article helpful?
0 out of 0 found this helpful