Skip to content
English
  • There are no suggestions because the search field is empty.

Configuring Okta for SCIM Integration

This guide will walk you through the steps needed to configure Okta for SCIM integration with Aidium.

Product Guides HeaderPrerequisites

  • Administrative access to your Okta Workforce Identity Cloud tenant
  • The SCIM endpoint URL and authentication token (we will provide these)

Steps for OpenID Connect + SCIM Setup

1

Configure OpenID Connect Application

  • Ensure you have an existing OpenID Connect application configured for authentication
  • Verify Federation Broker Mode is disabled

2

Create SCIM Application

  • Go to Applications > Applications
  • Click Create App Integration
  • Select Secure Web Authentication
  • On General App Settings:
    • Set application name and URL
    • Check "Do not display application icon to users"
    • Click Finish

3

Configure SCIM Settings

  • Navigate to the new application's General tab
  • Click Edit
  • In Provisioning section, select SCIM
  • Click Save

4

Configure SCIM Connection

  • Go to the Provisioning tab > Integration
  • Click Edit
  • Enter the SCIM endpoint URL we provided
  • Set "Unique identifier field for users" to userName
  • Under "Supported provisioning actions":
    • Enable "Push New Users" and "Push Profile Updates"
    • Select "HTTP Header" for Authentication Mode
    • Paste the provided SCIM token in the Authorization field
  • Click Test Connection Configuration
  • Click Save

5

Enable Provisioning Features

  • Go to Provisioning > Settings > To App
  • Click Edit
  • Enable:
    • Create Users
    • Update User Attributes
    • Deactivate Users
    • Click Save

6

Clean up Attribute Mappings

  • Remove these unnecessary mappings:
    • Primary email type
    • Primary phone type
    • Address type

7

Assign Users

  • Go to the Assignments tab.
  • Assign the same users/groups to both the OIDC and SCIM applications