How to configure SCIM with OKTA

First things First

To enable SCIM in the Yodeck app, first, you have to successfully enable SSO.

Also, you should log in to your account as an Account Owner.

 This guide describes the process of enabling SSO for SCIM.

Enable SCIM

  1. Login to your OKTA Account
  2. Click “Applications
  1. Click “Browse App Catalog” 
  1. Search and select “SCIM 2.0 Test App (OAuth Bearer Token)
  2. Click “Add Integration” 
  1. Configure your general settings. Click Next.
  2. Configure your desired sign-on options. Click Done.

  1. Switch to your Yodeck account
  2. Navigate to your account settings
  1. Click “SSO (Single Sign On)
  1. Click “Advanced Settings” Tab
  1. Turn on “Deprovision using SCIM
  1. Generate your secret token and click save
  1. Go again into the SSO and copy the secret token and identifier URL
  2. Navigate again to your OKTA account inside your SCIM app configuration tab
  3. Click Provisioning and click Configure API Integration 
  1. Enable API integration
  2. Paste your secret token and URL
  1. Test API credentials and SAVE

User provisioning/de-provisioning

  1. Go to the ‘Applications‘ tab
  1. In the Assignment tab, click Assign and Assign to People
  1. Select the user you want to assign to your application.
  1. Click Save. The user is provisioned.

  5. If you want to deprovision(delete) the user, design the user from the SCIM application.

6. The user is de-provisioned