Skip to content
  • There are no suggestions because the search field is empty.

How do I set up SCIM provisioning with Okta?

SCIM automates user account creation, updates, and deactivation in Siit based on your Okta directory. This guide shows you how to connect Okta to Siit using SCIM.

Before you begin:

  • Your Siit workspace must be on the Pro plan
  • You need Okta admin permissions

Step 1: Enable SCIM in Okta

  1. Log into Okta Admin Console
  2. Go to Applications → Applications
  3. Find and open your Siit application
  4. Check the box for Provisioning > SCIM


Step 2: Get your SCIM credentials from Siit

  1. In Siit, go to Settings → Security → SCIM
  2. You'll see two values:
    • SCIM Base URL (e.g., https://api.siit.io/scim/v2)
    • API Token (a long string starting with siit_)
  3. Keep this page open—you'll need these values in the next step

 


Step 3: Connect Okta to Siit

  1. Back in Okta, paste the SCIM Base URL into the Base URL field
  2. Paste the API Token into the API Token field
  3. Click Test API Credentials
  4. If successful, you'll see "The app was verified successfully"
  5. Click Save

Step 4: Configure provisioning actions

  1. Stay in the Provisioning tab and click To integration in the left sidebar
  2. Click Edit next to Provisioning to App
  3. Enable these three options:
    • Import New users and profile updates
    • Push new users 
    • ✅ Push profile updates 
    • ✅ Push Groups 
    • Import groups 
  4. Click Save



 

 

Step 5: Verify attribute mapping

Configure Mapping Settings and keep the default mapping

Enable these three options:

  • Create Users – Creates Siit accounts when users are assigned
  • Update User Attributes – Syncs changes from Okta to Siit
  • Deactivate Users – Removes Siit access when unassigned

  1. In the To App section, click Attribute Mappings
  2. Confirm these fields are mapped (default configuration):
    • userName → userName
    • email → email
    • title → title
    • primaryPhone → primaryPhone
    • preferredLanguage → preferredLanguage
  3. Click Save if you made any changes

Step 6: Assign users

  1. Go to the Assignments tab
  2. Click AssignAssign to People or Assign to Groups
  3. Select the users or groups you want to give Siit access
  4. Click Assign then Done

Users will be automatically created in Siit within a few minutes.


Step 7: Map Okta groups to Siit roles (optional but recommended)

This step lets you control Siit permissions using your existing Okta groups.

  1. Go to the Push Groups tab
  2. Click Push GroupsFind groups by name
  3. Search for and select an Okta group (e.g., "IT Team" or "Support Agents")
  4. Choose one of these options:
    • Link to existing Siit role – Connect this group to a role you've already created in Siit Settings → Roles
    • Create role in Siit – Let Okta automatically create a new role in Siit
  5. Click Save

Repeat for each group you want to map to Siit roles.

 

What happens next:

  • Anyone added to the Okta group will automatically get the mapped Siit role
  • Removing someone from the group removes their Siit role
  • Changes sync within minutes