Skip to main content
All CollectionsGetting StartedStep 3: Configure Employee OnboardingSCIM
How to setup SCIM provisioning using Okta to Cyberready app?
How to setup SCIM provisioning using Okta to Cyberready app?
Shailanchal Uniyal avatar
Written by Shailanchal Uniyal
Updated over 2 months ago

In this guide, we outline the step-by-step process for seamlessly integrating an internal application, RightHand Cybersecurity (RH), with Okta's authentication system. By leveraging Okta's admin console, we create a RH App and then create a SCIM integration.

NOTE: When a user is suspended from Okta the deactivation of that user is currently not supported in Cyberready. The following actions lead to archiving of a user in Cyberready:

  • When user is deleted

  • When user is deactivated

  • When user is removed from the app that is assigned to Cyberready

Configuration Steps

Login to the Okta account with admin credentials.

Create a new Application in Okta

  • Navigate to Okta Dashboard > Applications.

  • Click Create App Integration.

  • Select SAML2.0 on the app integration screen and then click Next.

  • Click Right-Hand Cybersecurity in the App name field. Once you're done with the setup, click Next.

  • In the Cyberready portal, navigate to your company Settings > Integrations > SSO > Add Integrations β†’ copy your SAML configurations.

  • Go back to OKTA and paste these settings into the Configure SAML tab and click Next.

  • Click I'm an OKTA customer adding an internal app and tick the checkbox This is an internal app that we have created and click Finish to complete the setup process.
    ​

Okta Settings for Enabling SCIM

  • Go to the General tab in RH App > Edit App Settings > Provisioning = SCIM and click Save.

  • Go to Provisioning tab > Integration > SCIM Connection > Edit.

  • SCIM connector base URL will be the Webhook URL copied from cyberready portal

  • Make the following selections:

    • Unique identifier field for users = email

    • Enable following Supported provisioning actions.

    • Import New Users and Profile Updates

    • Push New Users

    • Push Profile Updates

    • Authentication Mode > HTTP Header.

  • HTTP Header Token will be the token copied from Cyberready portal as shown below

  • Click on Test connector Configuration

  • Click on Save to complete the configuration

Mapping of SCIM Fields with Right-hand

Currently Right-hand ingests the SCIM fields and the mappings are as follows:

Right-hand Field

SCIM Field

Okta Field

email

userName

userName

First Name

name.givenName

user.firstName

Last Name

name.familyName

user.lastName

Department

department

user.department

Manager Name

managerValue

user.managerId

Office Location

formatted

user.postalAddress


​

Did this answer your question?