Skip to main content

Configure SCIM for OKTA

Alteryx supports the ability to provision, update and deprovision Analytics Cloud users through the System for Cross-domain Identity Management (SCIM) protocol. By enabling SCIM, your organization can use Okta groups to set user access to individual workspaces, and the services available to them.

Prerequisites

  • You have direct access to your Analytics Cloud workspace, and have been assigned the Workspace Admin role.

  • You have direct access to your instance of Okta, and have been assigned the Super Admin or App Admin role.

  • You have already enabled SAML SSO for your workspace. For more information, see Okta SSO Setup Guide (SAML).

Sugerencia

Auto-provisioning is most effective when user access is managed through groups. Within your IdP, consider managing application access using security groups instead of assigning users to the application, one-by-one.

Generating SCIM Token

  1. Within Analytics Cloud, navigate to your workspace’s Admin Console.

  2. Select User Provisioning in the left navigation menu.

  3. Select Enable Automatic User Provisioning.

  4. Select Enable.

  5. In the the Authentication Type dropdown, select Alteryx Token Authentication.

  6. Select Next.

  7. Note and copy your Tenant URL. You will use this later.

  8. Select Generate Token.

  9. In the Lifetime (Days) field, enter “365”.

  10. Select Generate.

  11. Note and copy your SCIM Token. You will use this later.

  12. Select Close.

Integration

Enabling SCIM

  1. In Okta, navigate to the application that is mapped to your workspace.

  2. Under the General tab, in the App Settings section, select Edit.

  3. Select the checkbox next to Enable SCIM provisioning.

  4. Select Save.

  5. Under the Provisioning tab.

  6. Select Edit.

  7. In the SCIM connector base URL field, enter the Tenant URL value copied from your workspace.

  8. In the Unique identifier field for users field, enter “email”.

  9. In the Supported provisioning actions section, select the checkbox next to Push New Users, Push Profile Updates, and Push Groups.

  10. In the Authentication Mode dropdown, select “HTTP Header”.

  11. In the Bearer Token field, enter the SCIM Token value you copied from your workspace.

  12. (Optional) Select Test Connection Configuration and select Close.

  13. Select Save and Edit.

  14. Select the checkbox next to Create Users.

  15. Select the checkbox next to Update User Attributes.

  16. Select the checkbox next to Deactivate Users.

  17. Select Save.

  18. (Optional) Under Attribute Mappings, deselect all attributes except for the following:

    givenName: user.firstName

    familyName: user.lastName

    email: user.email

Assigning Groups

  1. Navigate to the Push Groups tab.

  2. Select Push Groups, then Find Groups by Name.

  3. Enter the name of the group you want to sync and select it.

  4. Select Save.

  5. Navigate to the Assignments tab.

  6. Select the Groups filter.

  7. Select the Assign button, then Assign to Groups.

  8. Find the group you want to sync, then select Assign.

  9. Select Save and Go Back.

  10. Select Done.

Assigned groups will be synchronized to the workspace. Group members who do not already have access to the workspace will receive an email invite notification.

Nota

Depending on your Okta settings, it may take some time before users and user groups are synchronized to the corresponding workspace.

Permission Groups

  1. Within Analytics Cloud, navigate back to your workspace’s Admin Console.

  2. Navigate to the User Groups page.

  3. Hovering over a synchronized user group, select the 3-dot menu.

  4. Select Assign Roles.

  5. In the Assign Roles to Group dropdown, select or deselect one or more existing roles.

  6. Select Save.

Users who are already a member of the group will inherit the selected roles. Users added to Entra security groups in the future will be invited to the workspace and assigned the selected roles.