You can automatically provision your company’s users with Neowit from Okta. The guide requires that you’ve already set up an Application / Single Sign-On (SSO) using SAML in both the Neowit app and in Okta
Prerequisites
- A Neowit administrator account.
- An Okta subscription
- Okta admin privileges.
- Previously configured Application for SSO in Okta and paired it with an Authentication configuration in the Neowit app.
How to add
- Sign in to your Okta org with your administrator account.
- Click Admin in the upper-right right corner of the page.
- Select Applications > Applications.
- Click Browse App Catalog.
- Search for "SCIM 2.0 Test App (Header Auth)"
- Click "Add Integration"
- Set application label, for example "SCIM 2.0 Neowit (Header Auth)" and click Next.
- Add Default relay state, this should be the ACS URL and can be copied from the Authentication/Identity Provider page on Neowit's platform under Settings, see Service Provider Settings.
- Under advanced settings, you can skip most of these but Credential Details/Application username format has to be set to "email".
- Click Done.
- Navigate to the Provisioning tab and click "Configure API Integration".
- Enable the API integration, now we need to fetch the Base URL and API token from Neowit.
- Head back to Neowit's Identity Provider page, on the bottom the page enable SCIM User Provisioning (Beta) and select type Okta. Next click Replace Bearer Token and copy the value into the Okta API token. Then copy the Base URL from Neowit to Okta and click Save.
- Under Provisioning/Settings in Okta you should now see "To App" and "To Okta", open the "To App" tab. Edit this an enable "Create users", "Update user attributes", and "Deactivate users".
- Under Provisioning/Settings you can also see mappings (attributes mapped to Neowit), the Neowit platform requires only the following attributes and we recommend only using these:
- Head to the assignments page in Okta and assign users to be provisioned to the Neowit app.