Configuring Okta for SCIM Integration

This guide will walk you through the steps needed to configure Okta for SCIM integration with Aidium.

Product Guides HeaderPrerequisites

  • Administrative access to your Okta Workforce Identity Cloud tenant
  • The SCIM endpoint URL and authentication token (we will provide these)

Steps for OpenID Connect + SCIM Setup

1

Configure OpenID Connect Application

  • Ensure you have an existing OpenID Connect application configured for authentication
  • Verify Federation Broker Mode is disabled

2

Create SCIM Application

  • Go to Applications > Applications
  • Click Create App Integration
  • Select Secure Web Authentication
  • On General App Settings:
    • Set application name and URL
    • Check "Do not display application icon to users"
    • Click Finish

3

Configure SCIM Settings

  • Navigate to the new application's General tab
  • Click Edit
  • In Provisioning section, select SCIM
  • Click Save

4

Configure SCIM Connection

  • Go to the Provisioning tab > Integration
  • Click Edit
  • Enter the SCIM endpoint URL we provided
  • Set "Unique identifier field for users" to userName
  • Under "Supported provisioning actions":
    • Enable "Push New Users" and "Push Profile Updates"
    • Select "HTTP Header" for Authentication Mode
    • Paste the provided SCIM token in the Authorization field
  • Click Test Connection Configuration
  • Click Save

5

Enable Provisioning Features

  • Go to Provisioning > Settings > To App
  • Click Edit
  • Enable:
    • Create Users
    • Update User Attributes
    • Deactivate Users
    • Click Save

6

Clean up Attribute Mappings

  • Remove these unnecessary mappings:
    • Primary email type
    • Primary phone type
    • Address type

7

Assign Users

  • Go to the Assignments tab.
  • Assign the same users/groups to both the OIDC and SCIM applications