Skip to content

Commit 1af575a

Browse files
docs: improve Okta SCIM setup instructions (#14142)
* Add push groups step and remove steps to migrate to the app * Add a link to Okta docs Co-authored-by: Sarah Sanders <[email protected]> --------- Co-authored-by: Sarah Sanders <[email protected]>
1 parent 92ff05b commit 1af575a

File tree

1 file changed

+15
-16
lines changed

1 file changed

+15
-16
lines changed

contents/docs/settings/sso.mdx

Lines changed: 15 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -380,34 +380,33 @@ Before setting up SCIM, you need:
380380

381381
### Example: Okta
382382

383-
If your existing SAML app supports SCIM 2.0 provisioning, you can use it. Otherwise, follow these steps to create a new app that supports both SAML and SCIM:
383+
If you already have a custom SAML app configured for PostHog, you can enable SCIM provisioning directly on it. If not, first set up SAML following the [Okta SAML example](#example-okta), then continue with these steps:
384384

385-
1. In Okta admin, go to Applications and click **Create App Integration**.
386-
387-
2. Search for `SCIM 2.0 Test App (Auth Bearer Token)` and select it.
388-
389-
3. Leave **SAML sign-on** method enabled. Configure SAML following the steps in the [Okta SAML example](#example-okta).
385+
1. In Okta admin, go to **Applications** and open your PostHog app.
390386

391-
4. In PostHog, open your existing SAML configuration for the domain and update it with the new values from Okta (SAML ACS URL, SAML Entity ID, and SAML X.509 certificate).
387+
2. Navigate to the **Provisioning** tab and click **Configure API Integration**.
392388

393-
5. Navigate to the **Provisioning** tab in Okta and click **Configure API Integration**.
394-
395-
6. Check **Enable API integration** and enter:
389+
3. Check **Enable API integration** and enter:
396390
- **SCIM Base URL** from PostHog
397391
- **API Token** (the SCIM Token from PostHog)
398392

399-
7. Click **Test API Credentials** to verify the connection.
393+
4. Click **Test API Credentials** to verify the connection.
400394

401-
8. In the **Provisioning to App** settings, enable:
395+
5. In the **Provisioning to App** settings, enable:
402396
- Create Users
403397
- Update User Attributes
404398
- Deactivate Users
405399

406-
9. Go to the **Assignments** tab and configure role mapping.
407-
408-
10. Assign users to the PostHog application. Their email, name, and groups will be automatically updated in PostHog.
400+
6. Go to the **Assignments** tab and assign the application to users and groups.
401+
- Click **Assign to People** and select the users you want to provision into PostHog.
402+
- Click **Assign to Groups** and select the Okta groups to provision.
409403

410-
11. Once everything is working, you can remove or deactivate your old SAML-only application.
404+
7. Go to the **Push Groups** tab.
405+
- To push specific groups, select **Find groups by name**, then choose **Create Group** (creates a new role in PostHog) or **Link Group** (links it to an existing PostHog role). When you link the group to an existing role in PostHog, the role name will be updated to match Okta.
406+
- If you have lots of groups, you can choose **Find groups by rule**. This way, all groups matching the rule are pushed to PostHog.
407+
- Verify the pushed groups show as **Active**.
408+
409+
For detailed Okta instructions, see [Okta's SCIM provisioning documentation](https://help.okta.com/en-us/content/topics/apps/apps_app_integration_wizard_scim.htm).
411410

412411
### Example: OneLogin
413412

0 commit comments

Comments
 (0)