Setup
Setting up SCIM with Okta requires configuration in both Observability Platform and the Okta dashboard.Prepare Observability Platform for SCIM integration
Setting up SCIM with Okta requires a user with Okta super administrator access and a
user with Observability Platform SysAdmin permissions. These accounts can be the same
user.
- Contact Chronosphere Support to enable SCIM integration for Okta Workforce for your application.
-
Create an unrestricted service account in Observability Platform.
You must be a member of a team with the SysAdmin role to create a new service account.
For the New Service Account Name, Chronosphere recommends a meaningful service
account name like
Okta SCIM integration. - Copy the token to a safe place, as it’s provided only once, and can’t be displayed or recovered later.
- In Observability Platform, create a new, distinct team for the purpose of SCIM administration.
- Assign the User Administrator role to the team. For security, Chronosphere recommends only this team be assigned the User Admin role, and the role be specifically scoped to only have permission to communicate with the SCIM API, or have access to the service token.
- Add the service account user you created.
Configure SCIM integration on Okta
Your organization’s Okta administrator must configure Okta provisioning integration. Find general instructions for setting up Okta integration in the Okta documentation.- Using an administrator account, sign in to the Okta app to be used for single sign-on (SSO) integration with Observability Platform.
- Next to your username, click Admin.
- In the left sidebar menu, go to Applications > Applications.
- In the General tab, next to Provisioning, select SCIM and then click Save.
- Click the Provisioning tab.
- Click Integration, and then click Edit.
- Enter information for the following fields:
- SCIM connector base URL:
https://ADDRESS.chronosphere.io/api/scim/v2, whereADDRESSis your company name prefixed to your Observability Platform instance. - Unique identifier field for users: Enter
email. - Supported provisioning actions: Select only these values:
- Push New Users
- Push Profile Updates
- SCIM connector base URL:
- For Authentication Mode, select
HTTP Header. - For the Authorization section’s Bearer field, copy and paste the service token obtained when creating a service account in the Observability Platform console.
- Click Test Connector Configuration to ensure the integration configuration is correct. If you encounter an error message, review the configuration and try again.
- Click Save to save the configuration. The Provisioning to App page displays.
- Select the Enable checkboxes for Create Users and Update User Attributes.
- Click Save.
Update the Observability Platform default group in Okta
After completing SCIM integration setup process and connecting to Observability Platform, sync the existing users in your Okta tenant with Observability Platform. To do this, you must first remove all assigned users and groups, and then reassign them.- Sign in to Okta.
- Click Admin.
- In the left sidebar menu, go to Applications > Applications.
- In the Provisioning tab, clear the Deactivate Users checkbox.
Clear this checkbox before updating the group.
- Navigate to the Assignments tab and then select Groups.
- To remove all Existing Groups, click the X icon next to each group.
- Click the Assign button and reassign all Existing Groups.
- Navigate to the Provisioning tab, and then click Edit.
- Select the Deactivate Users checkbox.
Verify successful provisioning
After completing the setup process, verify the provisioning process succeeded.- In Okta, navigate to Dashboard -> Tasks.
- Look for failed requests. These display as
Application assignments encountered errors. - Retry any failed requests. If failures persist, contact Chronosphere Support.