Skip to content

Commit 63101dc

Browse files
committed
Update Blog “glc-scim-api-integration-with-okta-scim-adapter-1”
1 parent a24a9ab commit 63101dc

File tree

1 file changed

+27
-23
lines changed

1 file changed

+27
-23
lines changed

content/blog/glc-scim-api-integration-with-okta-scim-adapter-1.md

Lines changed: 27 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: HPE GreenLake Flex Solutions SCIM API Integration with Okta SCIM Adapter
3-
date: 2024-05-13T20:55:22.189Z
3+
date: 2024-05-27T17:30:08.818Z
44
author: Namik Rujnic - Cloud Operations
55
authorimage: /img/Avatar1.svg
66
disable: false
@@ -16,52 +16,56 @@ tags:
1616
## Okta (SCIM) Adapter
1717

1818
You can synchronize users and groups from your Okta identity management service to HPE GreenLake Flex Solutions using the Okta System for Cross-domain Identity Management (SCIM) adapter.
19+
1920
The Okta SCIM adapter application can be installed from the Okta Integration Network (OIN) into your Okta implementation to allow for integration with a SCIM-compliant API. Any user that needs to be synchronized to HPE GreenLake Flex Solutions must be assigned to the Okta SCIM adapter application in your Okta implementation. Groups whose memberships need to be synced to HPE GreenLake Flex Solutions must be added as a Push Group in the application. Users can be assigned to the application using the same groups that are synchronized to HPE GreenLake Flex Solutions.
2021

2122
# Configuring a SCIM application in Okta.
22-
* Step 1: In the Okta Admin Console, deploy an application from the app catalog.
23-
a. Go to Applications > Browse App Catalog.
24-
b. In the search bar type SCIM 2.0, and find the app called: SCIM 2.0 Test App (OAuth Bearer Token)
25-
c. Select the app and then click Add Integration.
26-
* Step 2: In the Add Scim2.0 Test App page, do the following:
27-
a. Change the application label name if you want and make sure Automatically log in when user lands on login page is checked.
23+
* Step 1: In the Okta Admin Console, deploy an application from the app catalog:
24+
a. Go to **Applications** > **Browse App Catalog**.
25+
b. In the search bar type SCIM 2.0, and find the app called: SCIM 2.0 Test App (OAuth Bearer Token).
26+
c. Select the application and then click **Add Integration**.
27+
28+
* Step 2: In the Add Scim2.0 Test App page, do the following:
29+
a. Change the application label name if you want and make sure **Automatically log in when user lands on login page** is checked.
2830

2931
![](/img/scimgeneral.png)
3032

31-
b. Click **Next.** On the following page, click **Done**.
33+
b. Click **Next.** On the following page, click **Done**.
34+
35+
36+
Step 3: After the application is created, configure the integration:
37+
a. Click the **Provisioning** tab, then select **Configure API Integration**.
38+
b. Select the **Enable API Integration** check box.
39+
c. In the SCIM 2.0 Base Url field, enter: https://sps.us1.greenlake-hpe.com/v1alpha1/scimproxy.
40+
d. In the OAuth Bearer Token field: [link to create long-lived tokens for user provisioning] Step 2 & 3
41+
e. Uncheck the box for the Import Groups option.
42+
f. Test that the URL and token are valid by clicking **Test API Credentials**, then click **Save**. If everything is correct, the following message is shown:
3243

33-
Step 3: After the application is created, configure the integration.
34-
a. Click the Provisioning tab, then select Configure API Integration.
35-
b.Select the Enable API Integration check box.
36-
c. In the SCIM 2.0 Base Url field, enter: https://sps.us1.greenlake-hpe.com/v1alpha1/scimproxy.
37-
d. In the OAuth Bearer Token field: [link to create long-lived tokens for user provisioning]Step 2 & 3
38-
e. Uncheck the box for the Import Groups option.
39-
f. Test that the URL and token are valid by clicking Test API Credentials, then click Save. If everything is correct, the following message is shown:
4044
* SCIM 2.0 Base Url: https://sps.us1.greenlake-hpe.com/v1alpha1/scimproxy         
41-
* Token: [link to create long-lived tokens for user provisioning](https://developer.hpe.com/blog/configuring-azure-ad-with-long-term-token-for-scim-provisiong/) **Step 2 & 3**
45+
* Token: [link to create long-lived tokens for user provisioning](https://developer.hpe.com/blog/configuring-azure-ad-with-long-term-token-for-scim-provisiong/)
46+
**Step 2 & 3**
4247
* **Uncheck** the box for Import Groups
4348

4449
After URL and Token are added test to make sure they are valid by clicking > **Test API** **Credentials** and **Save** if everything is correct should return the following message:
4550

4651
![](/img/scimtest.png)
4752

48-
* Step 4. Configure the synchronization settings.
49-
a:  Under the **Provisioning** tab > **To App** section, enable these settings:
53+
* Step 4. Configure the synchronization settings:
54+
a. Under the **Provisioning** tab > **To App** section, enable these settings:
5055

51-
- Create Users
52-
- Deactivate Users
56+
- Create Users
57+
- Deactivate Users
5358

5459

5560
1)**Create Users**                   2)**Deactivate Users**
5661

5762
![](/img/scim2app.png)
5863

59-
* Step 4 b: Select the six attributes shown in the following screenshot and discard the rest.
64+
b. Select the six attributes shown in the following screenshot and discard the rest.
6065

6166
![](/img/attributes.png)
6267

63-
**4c** Assign the group you want to synchronize to HPE GreenLake Flex Solutions to the SCIM application under the Application > Assignments tab and add it as a push group in the Push Groups tab.
64-
68+
c. Assign the group you want to synchronize to HPE GreenLake Flex Solutions to the SCIM application under the **Application** > **Assignments** tab and add it as a push group in the **Push Groups** tab.
6569

6670

6771
**Assignments** tab:

0 commit comments

Comments
 (0)