Overview
You can provision users from Okta to Oloid to reduce manually adding each employee to Oloid. The provisioning process reduces administrative errors and is a great way to save time and efforts.
With Okta to Oloid provisioning features, you can automate these tasks
Push new users β Any users you create into Okta can be provisioned / created into Oloid.
Push profile updates β Profile updates done in Okta are pushed to Oloid.
Push user deactivation β Deactivating or removing a user in Okta terminates the user in Oloid.
How to configure SCIM provisioning from Okta to Oloid
Prerequisite
You must have permission to create application in Okta Console.
Steps to Configure SCIM in OKTA
Log in to Okta Tenant Administration console.
Go to Applications > Applications and click Browse App Catalog.
Search SCIM 2.0 Test App (Header Auth).
The SCIM 2.0 Test App (Header Auth).
Click Add Integration.
Enter Application Label and click Next.
The Sign-On Options is displayed.
Click Done.
The General settings tab is configured successfully.
Go to Provisioning tab and click Configure API Integration.
Do the following:
Select Enable API integration.
Enter Base URL.
Enter API Token.
Note: To enter the Base URL and API Token, go to Oloid Tenant Admin Portal > Agents > SCIM and copy the Base URL and API Token.
Click Test API Credentials.
Note: Validation should succeed and you should see the message "Okta-SCIM was verified successfully".
Click Save.
Go to Provisioning > Settings > To App.
Enable the following sections:
Go to Assignments tab and click Assign.
The Assignment tab is displayed.
Do the following:
Assign to People:
Assign to Groups
The Okta SCIM client is configured.
Troubleshooting
If you have any questions or difficulties with your Oloid / Okta SCIM integration, please contact Oloid Support
Related Documents
Keywords
| SCIM 2.0 integration with Okta | Configure SCIM in Okta | Okta SCIM 2.0 Test App (Header Auth) |










