SCIM Provisioning Setup Okta
EasyDMARC supports SCIM provisioning with SSO authentication. This technical article focuses on SCIM setup for Okta. Requirements: Okta Admin Access, EasyDMARC Admin Access.
1. To get Started with SCIM Provisioning, head into you SSO configuration page within EasyDMARC.
https://account-console.easydmarc.com/sso/service-provider-details
Here you will be able to see and copy the Tenant URL and Secret Token for SCIM.
2. Navigate into your Okta Admin Console > Applications > EasyDMARC SAML App, Under General edit your App Settings and change the Provisioning Type to SCIM and Save.
3. Refresh and head into the Provisioning tab, here you'll find the SCIM connection setting where you can edit, and change the .
And enter the following properties.
SCIM connector base URL: Tenant URL Values from EasyDMARC
Unique identifier field for users: userName
Supported provisioning actions: Select Highlighted Option Below
Authentication Mode: HTTP Header
Authorization: Secret Token Values from EasyDMARC
Note: Make sure the Push Groups is disabled in Supported Provisioning Actions, otherwise an error will be thrown during login.
4. Test Connector Configurations, and they should pass.
Now you can use SCIM Provisioning with your EasyDMARC SAML App.