You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title: HPE GreenLake Flex Solutions SCIM API Integration with Okta SCIM Adapter
3
-
date: 2024-05-13T20:55:22.189Z
3
+
date: 2024-05-27T17:30:08.818Z
4
4
author: Namik Rujnic - Cloud Operations
5
5
authorimage: /img/Avatar1.svg
6
6
disable: false
@@ -16,60 +16,53 @@ tags:
16
16
## Okta (SCIM) Adapter
17
17
18
18
You can synchronize users and groups from your Okta identity management service to HPE GreenLake Flex Solutions using the Okta System for Cross-domain Identity Management (SCIM) adapter.
19
+
19
20
The Okta SCIM adapter application can be installed from the Okta Integration Network (OIN) into your Okta implementation to allow for integration with a SCIM-compliant API. Any user that needs to be synchronized to HPE GreenLake Flex Solutions must be assigned to the Okta SCIM adapter application in your Okta implementation. Groups whose memberships need to be synced to HPE GreenLake Flex Solutions must be added as a Push Group in the application. Users can be assigned to the application using the same groups that are synchronized to HPE GreenLake Flex Solutions.
20
21
21
22
# Configuring a SCIM application in Okta.
22
-
* Step 1: In the Okta Admin Console, deploy an application from the app catalog.
23
-
a. Go to Applications > Browse App Catalog.
24
-
b. In the search bar type SCIM 2.0, and find the app called: SCIM 2.0 Test App (OAuth Bearer Token)
25
-
c. Select the app and then click Add Integration.
26
-
* Step 2: In the Add Scim2.0 Test App page, do the following:
27
-
a. Change the application label name if you want and make sure Automatically log in when user lands on login page is checked.
23
+
24
+
***Step 1:** In the Okta Admin Console, deploy an application from the app catalog:
25
+
a. Go to **Applications** > **Browse App Catalog**.
26
+
b. In the search bar type SCIM 2.0, and find the app called: SCIM 2.0 Test App (OAuth Bearer Token).
27
+
c. Select the application and then click **Add Integration**.
28
+
29
+
***Step 2:** In the Add Scim2.0 Test App page, do the following:
30
+
a. Change the application label name if you want and make sure **Automatically log in when user lands on login page** is checked.
28
31
29
32

30
33
31
-
b. Click **Next.** On the following page, click **Done**.
34
+
<br />
32
35
33
-
Step 3: After the application is created, configure the integration.
34
-
a. Click the Provisioning tab, then select Configure API Integration.
35
-
b.Select the Enable API Integration check box.
36
-
c. In the SCIM 2.0 Base Url field, enter: https://sps.us1.greenlake-hpe.com/v1alpha1/scimproxy.
37
-
d. In the OAuth Bearer Token field: [link to create long-lived tokens for user provisioning]Step 2 & 3
38
-
e. Uncheck the box for the Import Groups option.
39
-
f. Test that the URL and token are valid by clicking Test API Credentials, then click Save. If everything is correct, the following message is shown:
40
-
* SCIM 2.0 Base Url: https://sps.us1.greenlake-hpe.com/v1alpha1/scimproxy
41
-
* Token: [link to create long-lived tokens for user provisioning](https://developer.hpe.com/blog/configuring-azure-ad-with-long-term-token-for-scim-provisiong/)**Step 2 & 3**
42
-
***Uncheck** the box for Import Groups
36
+
b. Click **Next**. On the following page, click **Done**.
43
37
44
-
After URL and Token are added test to make sure they are valid by clicking > **Test API****Credentials** and **Save** if everything is correct should return the following message:
38
+
**Step 3:** After the application is created, configure the integration:
39
+
a. Click the **Provisioning** tab, then select **Configure API Integration**.
40
+
b. Select the **Enable API Integration** check box.
41
+
c. In the SCIM 2.0 Base Url field, enter: https://sps.us1.greenlake-hpe.com/v1alpha1/scimproxy.
42
+
d. In the OAuth Bearer Token field: to create long-lived tokens for user provisioning, see step 2 and step 3 of the blog post [Configuring Azure Active Directory with long-lived tokens for user provisioning](https://developer.hpe.com/blog/configuring-azure-ad-with-long-term-token-for-scim-provisiong/).
43
+
e. Uncheck the box for the Import Groups option.
44
+
f. Test that the URL and token are valid by clicking **Test API Credentials**, then click **Save**. If everything is correct, the following message is shown:
45
45
46
46

47
47
48
-
* Step 4. Configure the synchronization settings.
49
-
a: Under the **Provisioning** tab > **To App** section, enable these settings:
50
-
51
-
- Create Users
52
-
- Deactivate Users
53
-
48
+
***Step 4:** Configure the synchronization settings:
49
+
a. Under the **Provisioning** tab > **To App** section, enable these settings:
54
50
55
-
1)**Create Users** 2)**Deactivate Users**
51
+
* Create Users
52
+
* Deactivate Users
56
53
57
54

58
55
59
-
* Step 4 b: Select the six attributes shown in the following screenshot and discard the rest.
56
+
b. Select the six attributes shown in the following screenshot and discard the rest.
60
57
61
58

62
59
63
-
**4c** Assign the group you want to synchronize to HPE GreenLake Flex Solutions to the SCIM application under the Application > Assignments tab and add it as a push group in the Push Groups tab.
64
-
65
-
60
+
c. Assign the group you want to synchronize to HPE GreenLake Flex Solutions to the SCIM application under the **Application** > **Assignments** tab and add it as a push group in the **Push Groups** tab.
66
61
67
62
**Assignments** tab:
68
63
69
64

70
65
71
-
72
-
73
66
**Push Groups** tab:
74
67
75
68

@@ -78,4 +71,4 @@ a: Under the **Provisioning** tab > **To App** section, enable these settings:
78
71
Adding the Group Everyone group to the SCIM application could have unintended effects on all users.
79
72
80
73
These are all the steps required to configure a SCIM 2.0 application. Remember that users must be members of a group that is assigned to the SCIM application and that group must be included in a push group.
81
-
Now all configured groups can be pushed into HPE GreenLake Flex Solutions via the Okta SCIM Adapter.
74
+
Now all configured groups can be pushed into HPE GreenLake Flex Solutions via the Okta SCIM Adapter.
0 commit comments