Skip to main content

Provisioning Hyperproof users and groups with SCIM

Use the SCIM provisioning option with your SSO directory to bring users into Hyperproof without having to invite each user individually.

Note

Hyperproof supports using SCIM to provision users and groups from Okta.

System for Cross-domain Identity Management (SCIM) is a protocol used for automated provisioning that manages the flow of user identity information between an Identity Provider and a cloud or service app, such as Hyperproof. Hyperproof can add, update, and deactivate users by using SCIM to access and monitor users authenticated by Okta.

Note

Hyperproof doesn't synchronize passwords. Users authenticate using a custom URL specific to your Hyperproof organization and their Okta credentials.

The workflow to use SCIM provisioning is as follows:

  1. Configure SCIM in Hyperproof. See Configuring SCIM in Hyperproof.

  2. Configure SCIM for the Hyperproof app in your SSO platform. See Okta SCIM Configuration.

  3. Configure your SSO platform to send users to Hyperproof and synchronize their data. Assign users in Okta to the Hyperproof app. This triggers the user synchronization between Okta and Hyperproof. See Assigning Hyperproof roles in Okta for SCIM provisioning and Adding an Okta directory user to Hyperproof with SCIM.

  4. Update user information in your SSO platform as needed and synchronize the updates back to Hyperproof. See Updating SCIM provisioned users in Okta.

  5. Configure your SSO platform to send groups to Hyperproof. If you are using Okta, assign groups to the Hyperproof app. This triggers the group synchronization between Okta and Hyperproof. Configuring groups is optional. See Provisioning groups from Okta using SCIM.