SCIM Provisioning - Okta
Here's how you can set up user provisioning with SCIM with Okta.
Single Sign On (SSO) vs. provisioning
If you're using an external directory to manage your users then there are 2 distinct capabilities to enable:
Setting up SSO to allow your users to log in using the credentials that you configured in your directory
Setting up provisioning (this guide) to be able to control the list of users and roles that have access to Tability from your directory.
Before: setup up the Tability app in Okta
Complete the steps in the SAML SSO - Okta guide to add a new Tability application in your Okta admin.
Part 1: Getting your SCIM base URL and auth token from Tability
Sign in to Tability with an admin account
Open up the admin section and go to SSO & Provisioning
At the bottom of the page you will find the SCIM authentication token and the SCIM base URL that you will need later to configure Okta.
Part 2: Setting up provisioning in Okta
Go to your Tability application in the Okta admin
Go to Provisioning > Integration
Click on Edit
Use the following settings to complete your connection
SCIM connector base URL: copy the SCIM base URL from Tability
Unique identifier field for users: email
Supported provisioning actions: select Push New Users and Push Profile Updates
Authentication Mode: HTTP Header
Authorization: add the SCIM authentication token from Tability
Click Test Connector Configuration. You should see a popup confirming that Create Users and Update User Attributes are enabled for this integration.
Click Save to complete the setup
Part 3: Assigning people to Tability
We recommend using groups to manage the assignment of users in Tability. Here are the 4 groups we suggest creating:
Tability Owners: list of people that should have the owner role in the workspace (they can control all the settings, including the subscription).
Tability Admins: list of users with the admin role
Tability Users: anyone who should be a regular user of Tability
Tability Readonly: list of users that should have read-only access to Tability
Once your groups are created, you can assign them to the Tability application in Okta.
Go to the Assignments > Groups configuration screen for the Tability app in Okta
Click Assign > Assign to Groups
Select the group to assign, and use the User type field to map the group role to the right role in Tability (see table below)
Tability Owners
owner
owner
Tability Admins
admin
admin
Tability Users
user
user
Tability Readonly
readonly
readonly
You will also need to use the assigned order of the groups is the same as in the picture below. This will ensure that if a user is a member of 2 different groups, their role will be determine by the group that has the highest priority.
For instance, if a user is part of Tability Readonly and Tability Admins, then they will get the admin role because that group has the highest priority.
Once your groups are added you can simply add users to the group and they will be added to Tability.
You can confirm that a user is synced with SCIM provisioning by going to the Users setting page in Tability and looking for a checkmark in the SCIM column.
Last updated
Was this helpful?