Integrating Okta for Provisioning
This guide provides the details about Britive application and Okta provisioning integration.
- Push New Users
- New users created through Okta will also be created in Britive.
- Push Groups
- Groups created in Okta can be sent to Britive. They will be used to target more accurately your users.
- Push Profile Updates
- Updates made to the user's profile through Okta will be pushed to Britive.
- Push User Deactivation
- Deactivating the user or disabling the user's access to the application through Okta will deactivate the user in Britive.
- Reactivate Users
- User accounts can be reactivated in the application.
Ensure that you have the following before integrating Britive and Okta:
- SCIM 2.0 Base URL
- Bearer token
Configuring an Identity Provider on Britive
An identity provider needs to be created in Britive for SSO.
- Login to Britive application with administrator privileges.
- Click on Admin->Identity Management from the navigation menu.
- Click on the Identity Providers tab.
- Click on ADD IDENTITY PROVIDER button.
- Enter Name and Description.
- Select Identity Provider Type as SAML.
- Click Add. A configuration page is displayed.
Configuring Provisioning on Britive
- Click on the Edit icon under SCIM Provider in the SCIM tab.
- Select Generic from the drop-down list for configuring an identity provider.
- Save the changes by clicking the icon next to the selection.
- Copy the SCIM URL and note it down. This URL is entered later to configure on the identity provider portal.
- Click on CREATE TOKEN.
- Enter the validity of the token and create a token. Copy this generated token and note it down. Click OK. This token is not displayed again. This token is entered later on the identity provider portal.
- Click on RECREATE TOKEN button to generate a new token, if needed.
- Click on EDIT TOKEN VALIDITY to update validity.
- Map the incoming attributes using the procedure explained in User mapping.
- Add SCIM token to tenant policy using the procedure listed in Adding SCIM Token to Tenant Policy section. Recreated token also needs to be added to the tenant SCIM policy.
Adding SCIM Token to Tenant Policy
- Click on Admin->Role & Policy Management->Policies.
- Search and select TenantSCIMPolicy from the list of policies.
- Click on Manage policy for TenantSCIMPolicy.
- Click Edit.
- Enter the following on Edit Policy page:
- Click on Select API Tokens.
- Select the token created in earlier section. The name of the token is same as the name of the identity provider.
- Click Save.
- Select Enable policy for TenantSCIMPolicy, if not enabled already.
After provisioning, by default, seven attributes from the identity provider are mapped to a Britive user.
You can see the mapped attributes by checking the Mapped Attributes checkbox in the User Mapping section. Out of these attributes, Status, Email, First Name, Last Name, and Username are mandatory attributes. The identity provider must send these attributes for the user to get created in Britive.
Additional attributes of the user from the identity provider can be configured in Britive. Follow these steps to map additional attributes:
- Select Admin->Identity Management from the navigation menu,
- Click on the Identity Attributes tab.
- Create a new attribute by clicking ADD IDENTITY ATTRIBUTE button.
- Enter the following values on Add Identity Attributes page:
- Enter the Name and description of the attribute.
- Select the type of attribute from the drop-down list.
- Check Multi valued for the attributes which can have multiple values. For example, user roles.
- Click ADD IDENTITY ATTRIBUTE. The created attribute is displayed in the list of identity attributes.
- Click the Identity Providers tab.
- Select the identity provider and click on the SCIM tab.
- Uncheck the Mapped Attributes checkbox to see the list of unmapped attributes.
- Click EDIT.
- Map the identity attribute with the incoming SCIM attribute.
- Click SAVE.
Configuring Okta for Provisioning
Follow the steps below for configuring SCIM provisioning between Okta and Britive:
- Login as Okta Administrator.
- Open the SAML application configured for Britive.
- Click on the General tab.
- Click on Edit for App Settings.
- Select SCIM under App Setting -> Provisioning. Click on Save.
- Click on the Provisioning tab.
- Click on Edit and enter the SCIM connector base URL copied in the previous section.
- Enter userName as the Unique identifier field for users.
- Select Push New Users, Push Profile Updates and Push Groups under Supported provisioning actions.
- Select HTTP Header under Authentication Mode.
- Enter the API token generated in the previous section in the Token field. Click on Test Connector Configuration. If you get a success message save the configuration. If you get any error, check the token, URL, and test again.
- Click on Edit next to Provisioning to App.
- Enable Create Users, Update User Attributes and Deactivate Users. Save the settings.
- Update the attribute mappings as required and delete the attributes which are not mapped.
- Click on the tab Sign On and click Edit.
- Select Email for the Application username format and click Save.
- Click on the Assignments tab. Add users individually or through groups. This provisions the users to the Britive application. To provision groups and group memberships, use the Push Groups feature. The users and tags provisioned through Okta cannot be updated in Britive. All the updates must be done in Okta and pushed to Britive.
- Britive does not support modifying groups that are created in Okta and provisioned in Britive.
- Britive does not support the linking of users between identity providers.
Reach out to our team at [email protected] if you encounter any issues.