This guide provides the details about the Britive application and Okta provisioning integration.
Supported Features
- Push New Users
- New users created through Okta will also be created in Britive.
- Push Groups
- Groups created in Okta can be sent to Britive. They will be used to target more accurately your users.
- Push Profile Updates
- Updates made to the user's profile through Okta will be pushed to Britive.
- Push User Deactivation
- Deactivating the user or disabling the user's access to the application through Okta will deactivate the user in Britive.
- Reactivate Users
- User accounts can be reactivated in the application.
Requirements
Ensure that you have the following before integrating Britive and Okta:
- SCIM 2.0 Base URL
- Bearer token
Configuration Steps
Configuring an Identity Provider on Britive
An identity provider needs to be created in Britive for SSO.
Log in to the Britive application with administrator privileges.
Click on Admin->Identity Management from the navigation menu.
Click on the Identity Providers tab.
Click on the Add Identity Provider button.
Enter name and description.
Select Identity Provider Type as SAML.
Click Add. A configuration page is displayed.
Configuring Provisioning on Britive
Click on the Edit icon under SCIM Provider in the SCIM tab.
Select Generic from the drop-down list for configuring an identity provider.
Save the changes by clicking the icon next to the selection.
Copy the SCIM URL and note it down. This URL is entered later to configure on the identity provider portal.
Click on Create Token.
Enter the validity of the token and create a token. Copy this generated token and note it down. Click OK. This token is not displayed again. This token is entered later on the identity provider portal.
Click on the Recreate token button to generate a new token, if needed.
Click on Edit token validity to update the validity.
Map the incoming attributes using the procedure explained in User mapping.
User mapping
After provisioning, by default, seven attributes from the identity provider are mapped to a Britive user.
You can see the mapped attributes by checking the Mapped Attributes checkbox in the User Mapping section. Out of these attributes, Status, Email, First Name, Last Name, and Username are mandatory attributes. The identity provider must send these attributes for the user to be created in Britive.
Additional user attributes from the identity provider can be configured in Britive. Follow these steps to map additional attributes:
Select Admin->Identity Management from the navigation menu,
Click on the Identity Attributes tab.
Create a new attribute by clicking the Add Identity Attribute button.
Enter the following values on the Add Identity Attribute page:
Enter the name and description of the attribute.
Select the type of attribute from the drop-down list.
Check Multi valued field for attributes that can have multiple values. For example, user roles.
Click Add. The created attribute is displayed in the list of identity attributes.
Click the Identity Providers tab.
Select the identity provider and click on the SCIM tab.
Uncheck the Mapped Attributes checkbox to see the list of unmapped attributes.
Click Edit.
Map the identity attribute with the incoming SCIM attribute.
Click Save.
Configuring Okta for Provisioning
As a best practice, Britive suggests granting access to Britive profiles via groups. For more information, see Group Sync with SCIM.
Follow the steps below for configuring SCIM provisioning between Okta and Britive:
- Log in as an Okta Administrator.
- Add Britive App in Okta:
- Navigate to Applications.
- Click Browse App Catalog and search for “Britive”.
Add the Britive app and assign it.
- Enable SCIM Provisioning:
- Click on the Provisioning settings tab.
- Click on Edit next to Provisioning to App and enable the following fields: Create Users, Update User Attributes, Deactivate Users. Save the settings.
- SCIM provisioning
- Create Users
- Update User Attributes
- Deactivate Users
- Push groups (if group membership sync is needed)
- Configure SCIM connection:
- Copy the Britive SCIM URL into the Base URL field.
- Enter the SCIM token generated from Britive into the Secret Token field.
- Select Bearer Token as the authentication type. These values are generated in the Creating an Identity Provider on Britive step.
- Test the integration:
- Click Test Connection in Okta.
- Click Save.
- Click on the Assignments tab. Add users individually or through groups. This provision allows users to access the Britive application.
- Push Groups: To provision groups and group memberships in Britive, use the Push Groups feature. The users and tags provisioned through Okta cannot be updated in Britive. All the updates must be done in Okta and pushed to Britive. As per the Okta limitation, you should not use the same groups under Assignments and Push Groups.
- Go to Push Groups -> Assign Groups.
- Choose the groups you want to sync with Britive.
- Optionally, you can link the existing Britive groups.
- Update the attribute mappings, as required, and delete the attributes that are not mapped.
- Click on the Sign On tab and click Edit.
- Select Email for the Application username format and click Save.
Known Issues
- Britive does not support modifying groups that are created in Okta and provisioned in Britive.
- Britive does not support linking users between identity providers.
Reach out to our team at support@britive.com if you encounter any issues.