If you have a lot of users to manage manually, you can now take advantage of SCIM provisioning in Okta! If you use Okta, follow the instructions below to setup SCIM provisioning so that:
-
Users are automatically created in Reachdesk when they are added to a group assigned to the Reachdesk app
- Users will have a sender role by default, but this can be updated after they are created
- User names and emails are automatically updated in Reachdesk when this changes in Okta
- Users are automatically deactivated in Reachdesk when they are deactivated in Okta
Note that we are not able to update Reachdesk teams yet, but this is coming up soon!
Please reach out to your IT team to help with this setup in Okta.
1. Create SCIM App in Okta
Go to the Applications page and click on "Browse App Catalog"
Then search for "SCIM 2.0 Test App (OAuth Bearer Token)" and select the app
Then click Add Integration.
2. Configure the App
Rename the app to Reachdesk and click Next
In the next page, set the following values:
- Login URL: https://app.reachdesk.com/users/saml/auth
- ACS URL: https://app.reachdesk.com/users/saml/auth
- Audience URL: https://app.reachdesk.com/users/saml/metadata
Once updated, click Done to complete the SAML setup
3. Create API Token for SCIM
In the Reachdesk platform, go to Organization > Settings > API Tokens and create a new API Token.
Copy the token and go back to Okta to finalize the configuration.
4. Setup Provisioning in Okta
In Okta, in the newly created Reachdesk application, open the Provisioning tab and click on Configure API Integration:
Configure the following values:
- SCIM 2.0 Base Url: https://app.reachdesk.com/scim_v2
- OAuth Bearer Token: [paste the newly created token]
Then click on Test API Credentials to verify it's working correctly, and then Save. Your application should be now configured to use SCIM for provisioning.
Finally, ensure that all provisioning options are enabled as desired (Create/Update/Deactivate):
5. Setup SAML authentication
You should now follow the steps for configuring the SAML authentication. You will need to download the metadata from Okta and upload it to Reachdesk > Organization > Settings > Single Sign On. You can find the instructions here.
Comments
0 comments
Please sign in to leave a comment.