How to configure SSO Login via Okta and OPTIZMO - SCIM Configuration
This guide goes hand in hand with the SAML guide for our Okta integration. Note the SAML guide should be completed first.
OPTIZMO users have the ability to configure Okta as their default Identity Provider (IdP) to power Single Sign On (SSO). This article details how to configure Okta as their IdP to facilitate SSO with OPTIZMO.
Supported Features
- Create Users
- Update user attributes
- Deactivate users
Requirements
In order to proceed with configuring login with SSO through Okta, you must:
- Have access to an Okta tenant
- Be an Okta administrator to that tenant
- Be an existing OPTIZMO account holder. If you do not have an OPTIZMO account, please email us on support@optizmo.net
- Have already completed the SAML guide
Configuration Steps
- Login to your OPTIZMO account here
- navigate to the settings page or click here
- Generate a new Single Sign-On API Key by clicking GENERATE API KEY
- Copy the key to your clipboard
- In the Okta dashboard, navigate to Applications and then select the Applications sub-menu
- Find the application you configured in the SAML guide click on it
- In the Provisioning tab click Configure API Integration -> Enable API Integration and then paste the API key for the API Token and click TEST API Credentials followed by Save
- click To App -> Edit and click Enable on all 4 checkboxes as shown and click Save
- Assign a user to the application by selecting the Assignments tab, Assign, Assign to People
- Choose a Person to assign to this application and click Assign - Note this will disable username and password-based logins to all your previous Optizmo users.
- The user may then initiate an IdP initiated login flow from their Okta Account to login to OPTIZMO.
Known Issues/Troubleshooting
There are no known issues at this time.