You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/blog/glc-scim-api-integration-with-okta-scim-adapter-1.md
+27-23Lines changed: 27 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: HPE GreenLake Flex Solutions SCIM API Integration with Okta SCIM Adapter
3
-
date: 2024-05-13T20:55:22.189Z
3
+
date: 2024-05-27T17:30:08.818Z
4
4
author: Namik Rujnic - Cloud Operations
5
5
authorimage: /img/Avatar1.svg
6
6
disable: false
@@ -16,52 +16,56 @@ tags:
16
16
## Okta (SCIM) Adapter
17
17
18
18
You can synchronize users and groups from your Okta identity management service to HPE GreenLake Flex Solutions using the Okta System for Cross-domain Identity Management (SCIM) adapter.
19
+
19
20
The Okta SCIM adapter application can be installed from the Okta Integration Network (OIN) into your Okta implementation to allow for integration with a SCIM-compliant API. Any user that needs to be synchronized to HPE GreenLake Flex Solutions must be assigned to the Okta SCIM adapter application in your Okta implementation. Groups whose memberships need to be synced to HPE GreenLake Flex Solutions must be added as a Push Group in the application. Users can be assigned to the application using the same groups that are synchronized to HPE GreenLake Flex Solutions.
20
21
21
22
# Configuring a SCIM application in Okta.
22
-
* Step 1: In the Okta Admin Console, deploy an application from the app catalog.
23
-
a. Go to Applications > Browse App Catalog.
24
-
b. In the search bar type SCIM 2.0, and find the app called: SCIM 2.0 Test App (OAuth Bearer Token)
25
-
c. Select the app and then click Add Integration.
26
-
* Step 2: In the Add Scim2.0 Test App page, do the following:
27
-
a. Change the application label name if you want and make sure Automatically log in when user lands on login page is checked.
23
+
* Step 1: In the Okta Admin Console, deploy an application from the app catalog:
24
+
a. Go to **Applications** > **Browse App Catalog**.
25
+
b. In the search bar type SCIM 2.0, and find the app called: SCIM 2.0 Test App (OAuth Bearer Token).
26
+
c. Select the application and then click **Add Integration**.
27
+
28
+
* Step 2: In the Add Scim2.0 Test App page, do the following:
29
+
a. Change the application label name if you want and make sure **Automatically log in when user lands on login page** is checked.
28
30
29
31

30
32
31
-
b. Click **Next.** On the following page, click **Done**.
33
+
b. Click **Next.** On the following page, click **Done**.
34
+
35
+
36
+
Step 3: After the application is created, configure the integration:
37
+
a. Click the **Provisioning** tab, then select **Configure API Integration**.
38
+
b. Select the **Enable API Integration** check box.
39
+
c. In the SCIM 2.0 Base Url field, enter: https://sps.us1.greenlake-hpe.com/v1alpha1/scimproxy.
40
+
d. In the OAuth Bearer Token field: [link to create long-lived tokens for user provisioning] Step 2 & 3
41
+
e. Uncheck the box for the Import Groups option.
42
+
f. Test that the URL and token are valid by clicking **Test API Credentials**, then click **Save**. If everything is correct, the following message is shown:
32
43
33
-
Step 3: After the application is created, configure the integration.
34
-
a. Click the Provisioning tab, then select Configure API Integration.
35
-
b.Select the Enable API Integration check box.
36
-
c. In the SCIM 2.0 Base Url field, enter: https://sps.us1.greenlake-hpe.com/v1alpha1/scimproxy.
37
-
d. In the OAuth Bearer Token field: [link to create long-lived tokens for user provisioning]Step 2 & 3
38
-
e. Uncheck the box for the Import Groups option.
39
-
f. Test that the URL and token are valid by clicking Test API Credentials, then click Save. If everything is correct, the following message is shown:
40
44
* SCIM 2.0 Base Url: https://sps.us1.greenlake-hpe.com/v1alpha1/scimproxy
41
-
* Token: [link to create long-lived tokens for user provisioning](https://developer.hpe.com/blog/configuring-azure-ad-with-long-term-token-for-scim-provisiong/)**Step 2 & 3**
45
+
* Token: [link to create long-lived tokens for user provisioning](https://developer.hpe.com/blog/configuring-azure-ad-with-long-term-token-for-scim-provisiong/)
46
+
**Step 2 & 3**
42
47
***Uncheck** the box for Import Groups
43
48
44
49
After URL and Token are added test to make sure they are valid by clicking > **Test API****Credentials** and **Save** if everything is correct should return the following message:
45
50
46
51

47
52
48
-
* Step 4. Configure the synchronization settings.
49
-
a: Under the **Provisioning** tab > **To App** section, enable these settings:
53
+
* Step 4. Configure the synchronization settings:
54
+
a. Under the **Provisioning** tab > **To App** section, enable these settings:
50
55
51
-
- Create Users
52
-
- Deactivate Users
56
+
- Create Users
57
+
- Deactivate Users
53
58
54
59
55
60
1)**Create Users** 2)**Deactivate Users**
56
61
57
62

58
63
59
-
* Step 4 b: Select the six attributes shown in the following screenshot and discard the rest.
64
+
b. Select the six attributes shown in the following screenshot and discard the rest.
60
65
61
66

62
67
63
-
**4c** Assign the group you want to synchronize to HPE GreenLake Flex Solutions to the SCIM application under the Application > Assignments tab and add it as a push group in the Push Groups tab.
64
-
68
+
c. Assign the group you want to synchronize to HPE GreenLake Flex Solutions to the SCIM application under the **Application** > **Assignments** tab and add it as a push group in the **Push Groups** tab.
0 commit comments