Overview
SCIM (System for Cross-domain Identity Management) is a standard for managing user and group provisioning in an Identity Provider (IdP), ensuring that updates to users and groups are reflected in any relying parties, such as Persona. Persona supports some SCIM functionality for customers using Okta as their IdP.
High-Level Steps to Enable SCIM Provisioning for a Persona Organization:**
- Enable 'SCIM Provisioning' for the relevant Okta app.
- Configure the SCIM integration in the 'Provisioning' tab for the app.
- Import users and groups from Persona.
- Create groups in Okta that will be mapped to Persona groups/roles.
Availability
SCIM is available on Growth and Enterprise plans.
Prerequisite
SCIM is a highly sensitive feature, and API keys do not have SCIM permissions enabled by default. Persona recommends creating a dedicated API key (distinct from the one used for general calls to persona-web) for SCIM purposes.
Creating an API Key
- Navigate to your Persona Dashboard > API
- Create a new API key via ‘+ Create API key’
- Once you’ve provided a name and description of the new API Key, you’ll be dropped in the configuration of the newly created API key
- Select the ‘Permissions’ tab, expand the ‘API’ drop-down, and check the checkbox for ‘Use API Key for SCIM’ Click on “Save”, and keep this in mind as we’ll need the API key for SCIM integration
Enabling SCIM Provisioning
- Log in to your Okta Admin Dashboard and navigate to the application you have pervious set up for the Persona SAML integration. For the purpose of this guide, we’ll refer to it as, Persona Application.
- Once you’ve selected the Persona Application, go to the 'General' tab. Under 'App Settings', click 'Edit' and enable ‘SCIM’ provisioning, then click 'Save'.
Configuring the SCIM Integration
-
Navigate to the 'Provisioning' tab for the Persona Application
-
Edit the 'SCIM Connection' with the following:
SCIM connector base URL https://withpersona.com/scim/v2 Unique identifier field for users userName Supported provisioning actions Select the following: Import New Users and Profile Updates, Push New Users, Push Profile Updates, Push Groups, Import Groups Authentication Mode HTTP Header -
Under HTTP Header, fetch the Persona SCIM API Key created in the prerequisite step and paste it into the field next to 'Bearer' in the dialog. You can get the API key by visiting https://withpersona.com/dashboard/api-configuration in your Persona account
-
Click 'Test Connector Configuration' to ensure the connection is successful.
-
Be sure to click 'Save', to save the configuration
Provisioning to App
-
Once the SCIM configuration is saved, you should see ‘Provisioning to App’, click ‘Edit’ to start the configuration
-
We recommend the following configuration for provisioning controls
Create Users [ x ] Enable Update User Attributes [ x ] Enable Deactivate Users [ x ] Enable Sync Password [ ] Enable -
Make sure you save the configuration before moving into the Import Users and Groups section
Import Users and Groups
- Navigate to the 'Import' tab for the Persona Application
- Click 'Import Now'. This will query Persona’s SCIM API to get a list of all users and groups in your Persona organization. You'll have the ability to map those to Okta users. After the import finishes, you should see a confirmation of how many Users and Groups were scanned.
- Once scanned, you can move towards the next section to map the Users and Groups.
Create and map groups in Okta
- Now, navigate to 'Directory > Groups' on the left side of your Okta dashboard
- Filter by ‘Group source type: App groups’, you can see the default groups of
Admin
,Analyst
, andDeveloper
, which correspond to the default roles in a Persona organization. As well as any other custom roles you have created inside your Persona Dashboard. - We'll need to map those to Okta groups. If you don't have existing Okta groups that you'd like to map to these app groups, you should create them now.
- Click 'Add Group', and give your groups a name and (optionally) a description. In this example, we'll create three new groups called
Persona-Admin
,Persona-Analyst
, andPersona-Developer
.
- Click 'Add Group', and give your groups a name and (optionally) a description. In this example, we'll create three new groups called
- For each of the new groups (those with the Persona- prefix), assign them to the Persona Application and assign the appropriate roles to people in your organization.
- To update the
Persona-Admin
group, click on its name, then click 'Applications', and assign it to the Persona Application. - Click 'People' and add the appropriate users to each group.
- To update the
- Once done for each group, we are ready to connect the Okta groups to the app groups you imported. Return to the page for your Persona Application and navigate to the 'Push Groups' tab.
- Click 'Push Groups', and then 'Find Groups by Name'. Begin typing the name of one of the groups until it appears.
- Select one of the groups. A dialog will appear with an option on the right that defaults to 'Create Group'. Change that to 'Link Group' and select the appropriate app group.
- You may see a message like "Linking to this group will rename the group in Persona Application". This is okay. Save, and repeat for each group. We recommend leaving 'Push group memberships immediately' checked.
- Perform this for each of the Roles/Groups that you have created
And your SCIM setup is now complete!