Skip to main content

Okta SCIM Configuration

Note

Hyperproof connects to many third-party systems that frequently change, including the system interface. Contact your System Administrator or the third-party provider for assistance meeting the requirements to integrate with Hyperproof.

Configuring the SCIM connection and provisioning

In Okta you must configure the SCIM connection and provisioning. Keep in mind the following:

  • Changes to users are sent from Okta to Hyperproof. If you change a user's first name, last name, email address, or role in Okta, the change is synchronized to Hyperproof. If you change a user's first name, last name, email address, or role in Hyperproof, the change is synchronized to Okta after an import is performed on the Okta side.

  • If you remove a user from Okta, that user is deactivated in Hyperproof. Be sure to reassign any work assigned to the deactivated user. See Reassigning work for a deactivated user.

  • Hyperproof roles must be assigned to users in Okta or those users will receive the default role of Limited access user when provisioned in Hyperproof.

SCIM supported features

The following features are supported:

  • Import new users and profile updates

  • Push new users

  • Push profile updates

  • Push groups

  • Deactivate users

To configure the SCIM connection:

  • You must be logged in to Okta as an administrator.

  • In Okta, locate the Hyperproof app.

    1. Click the Hyperproof app to open it.

    2. Select the General tab, if it is not already selected.

    3. Click Edit next to App Settings.

    4. Paste the Hyperproof SCIM Endpoint URL in the SCIM Endpoint URL field.

      This is the URL you copied when configuring Hyperproof for SCIM. See Configuring SCIM in Hyperproof.

    5. Click Save to save your changes.

    6. Select the Provisioning tab.

    7. Click Configure API Integration.

    8. Click Enable API Integration and add the Hyperproof Bearer Token into the API Token field.

      This is the bearer token you copied when configuring Hyperproof for SCIM. See Configuring SCIM in Hyperproof.

    9. Click Test API Credentials to make sure the connection is configured properly.

    10. Click Save to save your changes.

    11. On the Provisioning tab, select To App.

      The provisioning actions from Okta to Hyperproof display.

    12. Click Edit next to Provisioning to App.

    13. Turn on Create Users, Update User Attributes, and Deactivate Users.

    14. Turn off Setup password when creating new users.

    15. Click Save to save your changes.

For information on the entire workflow for configuring SCIM provisioning, see Provisioning Hyperproof users and groups with SCIM.