You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
-**`urn:ietf:params:scim:schemas:extension:LambdaTest:2.0:User:OrganizationRole`**: Custom attribute used to set LambdaTest Organization Role for Users, If this attribute is not mapped User role would be set by default. Allowed values are (Admin/Guest/User)
84
80
85
-
**urn:ietf:params:scim:schemas:extension:LambdaTest:2.0:User:OrganizationRole**: Custom attribute used to set LambdaTest Organization Role for Users, If this attribute is not mapped **User** role would be set by default. Allowed values are (Admin/Guest/User)
81
+
-**`urn:ietf:params:scim:schemas:extension:LambdaTest:2.0:User:LambdatestGroup`**: Used to assign an existing group in Lambdatest to a new user created in lambdatest through SCIM. (Applicable only if organisation has group support active)
86
82
87
83
For filtering only **userName** attribute is supported and must be selected for filtering, click edit on userPrincipalName and make sure **Apply this mapping** is set to **Always**
> That's all you need to know about LambdaTest SCIM Auto User Provisioning with Azure AD.In case you have any questions please feel free to reach out to us via the <span className="doc__lt" onClick={() => window.openLTChatWidget()}>**24/7 chat support**</span> or email us over [[email protected]](mailto:[email protected]).
This guide provides step-by-step instructions on how to generate a custom SpecFlow report in LambdaTest HyperExecute. By following the specified changes in the YAML file and modifying the test script, users can receive detailed test reports via email.
39
+
40
+
## Prerequisites
41
+
- A valid LambdaTest account.
42
+
- A configured HyperExecute environment.
43
+
- A SpecFlow-based test suite.
44
+
45
+
## Configuration Changes
46
+
To enable custom SpecFlow reporting, make the following changes to your YAML configuration file and test script.
47
+
48
+
### Step 1: Modify the YAML Configuration File
49
+
Add the following settings in your YAML file to enable reporting and configure partial reports:
Copy file name to clipboardExpand all lines: docs/okta-scim.md
+11-16Lines changed: 11 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
id: okta-scim
3
3
title: Okta Scim User Provisioning
4
-
hide_title: true
4
+
hide_title: false
5
5
sidebar_label: Okta
6
6
description: Integrating LambdaTest SCIM with Okta
7
7
keywords:
@@ -35,18 +35,11 @@ slug: scim/okta/
35
35
}}
36
36
></script>
37
37
38
-
39
-
40
-
41
-
# LambdaTest SCIM Auto User Provisioning with Okta
42
-
43
-
* * *
44
-
## Prerequisites ##
45
-
---
38
+
## Prerequisites
46
39
Integrate SCIM With LambdaTest:
47
40
48
-
* You will need an Enterprise plan with LambdaTest.
49
-
* SSO must be already integrated. Please complete [LambdaTest SSO & Okta Integration](/support/docs/lambdatest-sso-okta-integration/)
41
+
- You will need an Enterprise plan with LambdaTest.
42
+
- SSO must be already integrated. Please complete [LambdaTest SSO & Okta Integration](/support/docs/lambdatest-sso-okta-integration/)
50
43
51
44
## Integrating SCIM with Okta
52
45
**Step 1:** Sign in to your LambdaTest account. Don't have an account, [register for free](https://accounts.lambdatest.com/register).
@@ -83,11 +76,13 @@ Click Test Connection to ensure Okta can connect to LambdaTest. If the connectio
83
76
84
77
userName, Active, name.givenName, name.familyName are required attributes
85
78
86
-
***Creating Custom Attributes***
79
+
**Creating Custom Attributes**
80
+
81
+
For creating custom attribute in Okta, go to Directory > Profile Editor > Add Attribute > [Create Custom Attribute](https://help.okta.com/en-us/content/topics/users-groups-profiles/usgp-add-custom-user-attributes.htm)
For creating custom attribute in Okta, go to Directory > Profile Editor > Add Attribute ([Create Custom Attribute](https://help.okta.com/en-us/content/topics/users-groups-profiles/usgp-add-custom-user-attributes.htm))
85
+
**`urn:ietf:params:scim:schemas:extension:LambdaTest:2.0:User:LambdatestGroup`** : Applicable only if organisation has group support active)
Copy file name to clipboardExpand all lines: docs/scim.md
+11-28Lines changed: 11 additions & 28 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
id: scim
3
3
title: Getting Started With Scim User Provisioning
4
-
hide_title: true
4
+
hide_title: false
5
5
sidebar_label: SCIM
6
6
description: The SCIM specification is designed to make managing user identities easier. SCIM allows your Identity Provider (IdP) to manage users within your LambdaTest workspace
7
7
keywords:
@@ -34,41 +34,24 @@ slug: scim/
34
34
})
35
35
}}
36
36
></script>
37
-
38
-
39
-
40
-
41
-
# Getting Started With SCIM Auto User Provisioning
42
-
43
-
* * *
44
-
45
37
The SCIM specification is designed to make managing user identities easier. SCIM allows your Identity Provider (IdP) to manage users within your LambdaTest workspace
46
38
> SSO must be integrated before enabling SCIM. Please see [Getting Started With Single Sign On (SSO)](/support/docs/single-sign-on/) or [[email protected]](mailto:[email protected]) for questions.
47
39
48
40
## Benefits Of SCIM
41
+
Here are the following benefits of integrating SCIM with LambdaTest:
49
42
50
-
* * *
51
-
52
-
Here are the following benefits of integrating SCIM with LambdaTest
43
+
-**Efficiency and Automation**: SCIM automates the process of user identity management, making it more efficient and less error-prone. It enables automatic provisioning and de-provisioning of user accounts, reducing manual administrative tasks and associated errors.
44
+
-**Consistency:**: SCIM ensures that user data is consistent across different systems and services. When a user's attributes (like role) are updated in the identity provider, SCIM can be used to propagate those changes to all connected service providers, maintaining accurate and up-to-date information.
45
+
-**Security and Access Control:**: By centralizing identity management through SCIM, organizations can better enforce access control policies and ensure that users have appropriate access rights to the resources they need. This can help mitigate security risks associated with improper access permissions.
46
+
-**Assigning Groups to Users (If Groups Are Activated in Your Organization) :** If your organization has group functionality enabled, you can assign existing LambdaTest groups to users provisioned through an Identity Provider (IdP) such as Microsoft Azure AD, Okta, and others using SCIM.
47
+
> Connect with our [24/7 customer support](mailto:[email protected]) team to get the **Group** feature enabled for your organization.
53
48
54
-
***Efficiency and Automation**: SCIM automates the process of user identity management, making it more efficient and less error-prone. It enables automatic provisioning and de-provisioning of user accounts, reducing manual administrative tasks and associated errors.
55
-
56
-
***Consistency:**: SCIM ensures that user data is consistent across different systems and services. When a user's attributes (like role) are updated in the identity provider, SCIM can be used to propagate those changes to all connected service providers, maintaining accurate and up-to-date information.
57
-
58
-
***Security and Access Control:**: By centralizing identity management through SCIM, organizations can better enforce access control policies and ensure that users have appropriate access rights to the resources they need. This can help mitigate security risks associated with improper access permissions.
59
49
60
50
## Feature Of SCIM
61
-
62
-
* * *
63
-
64
51
LambdaTest provides the support for the below SCIM features.
65
52
66
-
***User Provisioning and De-provisioning**: SCIM facilitates the automatic provisioning and de-provisioning of user accounts across different systems and services. When a user is added or removed from the identity provider, SCIM can be used to propagate these changes to your LambdaTest account.
67
-
68
-
***Updating User Attributes**: Using SCIM you can update user attribute such as **Organization Role** directly from your Identity Provider.
69
-
70
-
## Enable LambdaTest SCIM
71
-
***
53
+
-**User Provisioning and De-provisioning**: SCIM facilitates the automatic provisioning and de-provisioning of user accounts across different systems and services. When a user is added or removed from the identity provider, SCIM can be used to propagate these changes to your LambdaTest account.
54
+
-**Updating User Attributes**: Using SCIM you can update user attribute such as **Organization Role** directly from your Identity Provider.
72
55
73
56
## Copy SCIM Base URL and Bearer Token (Auth Header Required by IdP)
74
57
**Step 1:** Sign in to your LambdaTest account. Don't have an account, [register for free](https://accounts.lambdatest.com/register).
@@ -84,7 +67,7 @@ LambdaTest provides the support for the below SCIM features.
0 commit comments