Connect an Okta Directory
To connect an Okta directory to Tonkean using SCIM, follow the steps below.
You must already have an existing Okta directory to follow this process. If you don't already have an Okta account, visit Okta to create one.
Create an Application in Okta
To connect to Okta from an external service, you must configure an application in Okta.
Navigate to Okta and log in to your account.
Select Applications > Applications. The Applications screen displays.
Select Browse App Catalog. The Browse App Integration Catalog screen displays.
Enter "SCIM 2.0 Test App (Header Auth)" in the search field and select SCIM 2.0 Test app (Header Auth) in the Suggestions dropdown. The SCIOM 2.0 Test App screen displays.
Select Add. The Add SCIM 2.0 Test App (Header Auth) screen displays.
If desired, you can enter a name for the application in the Application label field. If you choose to add a custom name, we recommend using the name of the board you plan to connect to the application. Leave all other fields set to their default values. Then, select Next. The Sign-On Options tab displays.
The Sign-On Option tab allows you to configure how users log in to your application, but this isn't necessary for provisioning. Scroll to the bottom and select Done.
Your application is connected.
Configure API Integration
Once your Okta application is connected, you must configure the API integration.
On the SCIM 2.0 Test App (Header Auth) screen, select the Provisioning tab. The Provisioning tab displays.
Select Configure API Integration.
Select the Enable API Integration checkbox. The Base URL and API Token fields display.
In the Base URL field, enter the server you want to use with the suffix
/scim/v2
.You can find the Tonkean SCIM API URL by selecting your profile icon in the upper right and navigating to Board Settings > Identity Provider.
Local host URL:
https://{your_name}sbackend.ngrok.io/scim/v2
Test environment URL:
https://api-test.tonkean.com/scim/v2
Next, you must generate an API token. To generate this token, open your Tonkean board, select your profile icon in the upper right, and navigate to Board Settings > Identity Provider. Select Create New Provider. The Create New Provider window displays.
Select the Provider Type dropdown and choose OKTA. Then, enter a Display Name for the provider. When finished, select Generate Token. The Access Token displays.
Select Copy to copy the access token. Paste the token in a separate file.
This is the last time you'll be able to view the decrypted token, so make sure you save it somewhere safe in case you need to reference it later.
Return to Okta. In the API Token field, enter
token
, insert a space, and then paste in the API token.Select Test API Credentials. If the test is successful, a success message displays. If the test is not successful, an error message displays. The content of the error message should help you troubleshoot potential causes for the error.
Once you receive a success message, select Save.
Select the Provisioning tab. The Provisioning tab displays.
Select Edit. The Provisioning to App settings become editable.
Select the Enable checkboxes that correspond with the following settings:
Create Users
Update User Attributes
Deactivate Users
When finished, select Save.
The Okta application is successfully integrated with the Tonkean API.
Add Tonkean Roles
Now that the API integration is set up, you must add Tonkean roles to users and to the application.
Add Tonkean Roles to Users
You must add the tonkeanRoles parameter to the users in your directory, and then assign users those roles.
In Okta, select Directory > Profile Editor. The Profile Editor screen displays.
Select User. The User profile displays.
Select Add Attribute. The Add Attribute window displays.
Enter the following values:
Data type -
string array
Display name -
Tonkean Roles
Variable name -
tonkeanRoles
External name -
tonkeanRoles
External namespace -
urn:scim:tonkean
Enum - Select the Define enumerated list of values checkbox.
Attribute members:
Process Contributor
-PROCESS_CONTRIBUTOR
System User
-SYSTEM_USER
If the Scope field displays, select the User personal checkbox.
Confirm the values are correct and select Save.
Now, you can provide permissions for users in your Okta directory. In the Okta navigation panel, select People. The People screen displays.
Select a user. The selected user profile displays.
One the user profile, select the Profile tab, then select Edit. The user profile enters edit mode.
Scroll to the bottom of the screen. There should be a custom field titled Tonkean Role with checkboxes the values you created in previous steps. Select the checkboxes to assign the roles as desired, then select Save.
Repeat steps #7-9 for the rest of the users that you would like to assign a role to in Tonkean.
Add Tonkean Roles to the Application
Once roles are added and assigned to users, you can add Tonkean roles to your Okta application.
In Okta, select Applications > Applications. The Applications screen displays.
Select SCIM 2.0 Test App (Header Auth) from the list of applications. The SCIM 2.0 Test App (Header Auth) screen displays.
On the SCIM 2.0 Test App (Header Auth) screen, select the Provisioning tab. The Provisioning tab displays
Scroll down to the SCIM 2.0 Test App (Header Auth) Attribute Mappings heading. Below this heading, select Go to Profile Editor. The Profile Editor screen displays.
Select Add Attribute. The Add Attribute window displays.
Enter the following values:
These are the same values you added in step #4 when adding roles to users.
Data type -
string array
Display name -
Tonkean Roles
Variable name -
tonkeanRoles
External name -
tonkeanRoles
External namespace -
urn:scim:tonkean
Enum - Select the Define enumerated list of values checkbox.
Attribute members:
Process Contributor
-PROCESS_CONTRIBUTOR
System User
-SYSTEM_USER
If the Scope field displays, select the User personal checkbox.
Confirm the values are correct and select Save.
On the Profile Editor screen, select Mappings. The Application User Profile Mappings window displays.
Select Okta User to {Application Name}.
Scroll to the down to the bottom of the window and select the dropdown beside the tonkeanRoles. From that dropdown, select user.tonkeanRole.
When finished, select Save Mappings.
The connection and configuration process is complete. You can now provision Tonkean users and groups in Okta.