Home Single Sign On (SSO) How to setup SCIM Single Sign-on (Okta SCIM Setup)

How to setup SCIM Single Sign-on (Okta SCIM Setup)

Last updated on May 29, 2024

This article will show you how to enable SCIM in your current SSO setup. SCIM is used to auto-provision users via your active directory.

  1. In order to utilise SCIM with Okta, you first need to setup SAML SSO - please follow our SSO guidance on this before attempting to setup SCIM provisioning. If you already have this in place you do not need to do this again.

  2. On your portal enable SCIM provisioning under Organisation > Single Sign On, save the Tenant URL for later - You can either invite users on creation or choose to manually send the invites after they’re provisioned.

  3. On your LMS portal click on Organisation > API Integrations and create a token with the permissions: users.read, users.write, groups.read and groups.write

  4. Save the token string

  5. On your app in Okta, enable SCIM Provisioning under General > App Settings and save the changes

  6. Open the new Provisioning tab

  7. Enter the details below:

    • Your SCIM connector is your Tenant URL from the LMS (your URL + scim/v2)

    • UID for users is userName

    • Tick all boxes for actions

    • Authentication mode is HTTP Header 

  8. Fill your HTTP token using the API key generated from the LMS and click test configuration

  9. Once completed, ensure the following options are enabled in the settings:
    SCIM-11

  10. Then ensure attribute mapping is configured as follows:
    SCIM-12

  11. The integration can then be used by visiting the ‘Assignments’ tab and assigning users and groups.

  12. In order to sync groups, you must use the ‘Push Groups’ tab on the custom app integration. If you do not see this option and pushing groups is unavailable to you - you may need to speak with Okta to get this enabled for your tenant.

If you need any support please email support@bobsbusiness.co.uk and we can assist.