Skip to content

Commit 103ecd3

Browse files
authored
Merge pull request #2561 from hpe-dev-incubator/cms/blog/glc-scim-api-integration-with-okta-scim-adapter-1
Update Blog “glc-scim-api-integration-with-okta-scim-adapter-1”
2 parents a24a9ab + 31cd92b commit 103ecd3

File tree

1 file changed

+26
-33
lines changed

1 file changed

+26
-33
lines changed
Lines changed: 26 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: HPE GreenLake Flex Solutions SCIM API Integration with Okta SCIM Adapter
3-
date: 2024-05-13T20:55:22.189Z
3+
date: 2024-05-27T17:30:08.818Z
44
author: Namik Rujnic - Cloud Operations
55
authorimage: /img/Avatar1.svg
66
disable: false
@@ -16,60 +16,53 @@ tags:
1616
## Okta (SCIM) Adapter
1717

1818
You can synchronize users and groups from your Okta identity management service to HPE GreenLake Flex Solutions using the Okta System for Cross-domain Identity Management (SCIM) adapter.
19+
1920
The Okta SCIM adapter application can be installed from the Okta Integration Network (OIN) into your Okta implementation to allow for integration with a SCIM-compliant API. Any user that needs to be synchronized to HPE GreenLake Flex Solutions must be assigned to the Okta SCIM adapter application in your Okta implementation. Groups whose memberships need to be synced to HPE GreenLake Flex Solutions must be added as a Push Group in the application. Users can be assigned to the application using the same groups that are synchronized to HPE GreenLake Flex Solutions.
2021

2122
# Configuring a SCIM application in Okta.
22-
* Step 1: In the Okta Admin Console, deploy an application from the app catalog.
23-
a. Go to Applications > Browse App Catalog.
24-
b. In the search bar type SCIM 2.0, and find the app called: SCIM 2.0 Test App (OAuth Bearer Token)
25-
c. Select the app and then click Add Integration.
26-
* Step 2: In the Add Scim2.0 Test App page, do the following:
27-
a. Change the application label name if you want and make sure Automatically log in when user lands on login page is checked.
23+
24+
* **Step 1:** In the Okta Admin Console, deploy an application from the app catalog:
25+
a. Go to **Applications** > **Browse App Catalog**.
26+
b. In the search bar type SCIM 2.0, and find the app called: SCIM 2.0 Test App (OAuth Bearer Token).
27+
c. Select the application and then click **Add Integration**.
28+
29+
* **Step 2:** In the Add Scim2.0 Test App page, do the following:
30+
a. Change the application label name if you want and make sure **Automatically log in when user lands on login page** is checked.
2831

2932
![](/img/scimgeneral.png)
3033

31-
b. Click **Next.** On the following page, click **Done**.
34+
<br />
3235

33-
Step 3: After the application is created, configure the integration.
34-
a. Click the Provisioning tab, then select Configure API Integration.
35-
b.Select the Enable API Integration check box.
36-
c. In the SCIM 2.0 Base Url field, enter: https://sps.us1.greenlake-hpe.com/v1alpha1/scimproxy.
37-
d. In the OAuth Bearer Token field: [link to create long-lived tokens for user provisioning]Step 2 & 3
38-
e. Uncheck the box for the Import Groups option.
39-
f. Test that the URL and token are valid by clicking Test API Credentials, then click Save. If everything is correct, the following message is shown:
40-
* SCIM 2.0 Base Url: https://sps.us1.greenlake-hpe.com/v1alpha1/scimproxy         
41-
* Token: [link to create long-lived tokens for user provisioning](https://developer.hpe.com/blog/configuring-azure-ad-with-long-term-token-for-scim-provisiong/) **Step 2 & 3**
42-
* **Uncheck** the box for Import Groups
36+
b. Click **Next**. On the following page, click **Done**.
4337

44-
After URL and Token are added test to make sure they are valid by clicking > **Test API** **Credentials** and **Save** if everything is correct should return the following message:
38+
**Step 3:** After the application is created, configure the integration:
39+
a. Click the **Provisioning** tab, then select **Configure API Integration**.
40+
b. Select the **Enable API Integration** check box.
41+
c. In the SCIM 2.0 Base Url field, enter: https://sps.us1.greenlake-hpe.com/v1alpha1/scimproxy.
42+
d. In the OAuth Bearer Token field: to create long-lived tokens for user provisioning, see step 2 and step 3 of the blog post [Configuring Azure Active Directory with long-lived tokens for user provisioning](https://developer.hpe.com/blog/configuring-azure-ad-with-long-term-token-for-scim-provisiong/).
43+
e. Uncheck the box for the Import Groups option.
44+
f. Test that the URL and token are valid by clicking **Test API Credentials**, then click **Save**. If everything is correct, the following message is shown:
4545

4646
![](/img/scimtest.png)
4747

48-
* Step 4. Configure the synchronization settings.
49-
a:  Under the **Provisioning** tab > **To App** section, enable these settings:
50-
51-
- Create Users
52-
- Deactivate Users
53-
48+
* **Step 4:** Configure the synchronization settings:
49+
a. Under the **Provisioning** tab > **To App** section, enable these settings:
5450

55-
1)**Create Users**                   2)**Deactivate Users**
51+
* Create Users
52+
* Deactivate Users
5653

5754
![](/img/scim2app.png)
5855

59-
* Step 4 b: Select the six attributes shown in the following screenshot and discard the rest.
56+
b. Select the six attributes shown in the following screenshot and discard the rest.
6057

6158
![](/img/attributes.png)
6259

63-
**4c** Assign the group you want to synchronize to HPE GreenLake Flex Solutions to the SCIM application under the Application > Assignments tab and add it as a push group in the Push Groups tab.
64-
65-
60+
c. Assign the group you want to synchronize to HPE GreenLake Flex Solutions to the SCIM application under the **Application** > **Assignments** tab and add it as a push group in the **Push Groups** tab.
6661

6762
**Assignments** tab:
6863

6964
![](/img/scim-group.png "Assignments tab")
7065

71-
72-
7366
**Push Groups** tab:
7467

7568
![](/img/scim-push.png "Push Groups tab:")
@@ -78,4 +71,4 @@ a:  Under the **Provisioning** tab > **To App** section, enable these settings:
7871
Adding the Group Everyone group to the SCIM application could have unintended effects on all users.
7972

8073
These are all the steps required to configure a SCIM 2.0 application. Remember that users must be members of a group that is assigned to the SCIM application and that group must be included in a push group.
81-
Now all configured groups can be pushed into HPE GreenLake Flex Solutions via the Okta SCIM Adapter.
74+
Now all configured groups can be pushed into HPE GreenLake Flex Solutions via the Okta SCIM Adapter.

0 commit comments

Comments
 (0)