Integrating CyberArk Identity for Provisioning
    • PDF

    Integrating CyberArk Identity for Provisioning

    • PDF

    Article Summary

    This guide provides the details about Britive application and CyberArk Identity provisioning integration.


    Ensure that you have the following before integrating Britive and CyberArk Identity:

    • SCIM 2.0 Base URL
    • Bearer token

    Configuration Steps

    Configuring an Identity Provider on Britive

    An identity provider needs to be created in Britive for SSO. 

    1. Login to Britive application with administrator privileges.
    2. Click on Admin->Identity Management from the navigation menu.
    3. Click on the Identity Providers tab.
    4. Click on ADD IDENTITY PROVIDER button.
    5. Enter Name and Description.
    6. Select Identity Provider Type as SAML.
    7. Click Add. A configuration page is displayed.

    Configuring Provisioning on Britive

    1. Click on the Edit icon under SCIM Provider in the SCIM tab.
    2. Select Generic from the drop-down list for configuring an identity provider.
    3. Save the changes by clicking the icon next to the selection.
    4. Copy the SCIM URL and note it down. This URL is entered later to configure on the identity provider portal.
    5. Click on CREATE TOKEN.
    6. Enter the validity of the token and create a token. Copy this generated token and note it down. Click OK. This token is not displayed again. This token is entered later on the identity provider portal. 
    7. Click on RECREATE TOKEN button to generate a new token, if needed. 
    8. Click on EDIT TOKEN VALIDITY to update validity.
    9. Map the incoming attributes using the procedure explained in User mapping.
    10. Add SCIM token to tenant policy using the procedure listed in Adding SCIM Token to Tenant Policy section. Recreated token also needs to be added to the tenant SCIM policy.

    Adding SCIM Token to Tenant Policy

    1. Click on Admin->Role & Policy Management->Policies.
    2. Search and select TenantSCIMPolicy from the list of policies.
    3. Click on Manage policy for TenantSCIMPolicy.
    4. Click Edit.
    5. Enter the following on Edit Policy page:
      1. Click on Select API Tokens.
      2. Select the token created in earlier section. The name of the token is same as the name of the identity provider.
      3. Click Save.
    6. Select Enable policy for TenantSCIMPolicy, if not enabled already.

    User mapping

    After provisioning, by default, seven attributes from the identity provider are mapped to a Britive user.

    You can see the mapped attributes by checking the Mapped Attributes checkbox in the User Mapping section. Out of these attributes, Status, Email, First Name, Last Name, and Username are mandatory attributes. The identity provider must send these attributes for the user to get created in Britive.

    Additional attributes of the user from the identity provider can be configured in Britive. Follow these steps to map additional attributes:

    1. Select Admin->Identity Management from the navigation menu,
    2. Click on the Identity Attributes tab.
    3. Create a new attribute by clicking ADD IDENTITY ATTRIBUTE button.
    4. Enter the following values on Add Identity Attributes page:
      1. Enter the Name and description of the attribute.
      2. Select the type of attribute from the drop-down list.
      3. Check Multi valued for the attributes which can have multiple values. For example, user roles.
      4. Click ADD IDENTITY ATTRIBUTE. The created attribute is displayed in the list of identity attributes.
    5. Click the Identity Providers tab.
    6. Select the identity provider and click on the SCIM tab.
    7. Uncheck the Mapped Attributes checkbox to see the list of unmapped attributes.
    8. Click EDIT.
    9. Map the identity attribute with the incoming SCIM attribute.
    10. Click SAVE.

    Configuring CyberArk Identity for Provisioning

    1. Login to CyberArk User Portal as CyberArk identity Administrator. 
    2. Navigate to the Admin Portal.
    3. Navigate to Apps & Widgets -> Web Apps from the sidebar menu and click the Add Web Apps button.
    4. Click on the Custom tab and add the SAML web app.
    5. Enter the following on the Settings page:
      1. Add a Name and Description.
      2. Uncheck the Show in user app list checkbox from the Advanced section.
    6. Copy the SCIM URL and token from Britive.
    7. Enter the following on the Provisioning page:
      1. Check Enable Provisioning for this application.
      2. Add the SCIM URL copied from Britive in the SCIM Service URL.
      3. Select Authentication Type as Authorization Header.
      4. Select Header Type as Bearer Token and add token in Bearer Token.
      5. Click on Verify to validate the credentials.
    8. Add specific roles required to be provisioned as groups under role mapping.
    9. Click Save to save the web application.

    Was this article helpful?