What's New !!

Pricing Offers

We are happy to announce special offers for miniOrange Atlassian SSO, 2FA, REST API, User Sync and Group Sync Apps.

Contact Info

For any query, product related information or any help , contact us now. You can also raise a ticket with our support.

 

Contact Us Now

Crowd Using SCIM User And Group Provisioning For okta


User Sync & Group Sync app provisions user and group information from Okta to Crowd. Users, groups, and directory details can be provisioned using SCIM. SCIM provisioning works based on events performed on IDP. This way the administrator only needs to manage user accounts in Okta. This reduces the administration time required to create users and groups in Atlassian modules such as Okta.


Download And Installation



  • Log into your Crowd instance as an admin.
  • Navigate to the Administration menu and Click Manage Apps.
  • Click Find new apps or Find new add-ons from the left-hand side of the page.
  • Locate SCIM for Crowd via search and click on install.
  •  SCIM into Crowd, Install Crowd Add-On through manage apps menu

Step 1: Get SCIM Client Details

  • In the SCIM configuration, Please enter App Name and click on the Save Settings button. Copy the SCIM Base URL and SCIM Bearer Token, these will be used later to configure the SCIM application on Okta.
  • Select Azure AD as SCIM Provider

Step 2: Setup Okta SCIM Configurations

  • Login to your Okta organisation as a user with administrator privileges.
  • Navigate to Admin Portal > Applications. Click on Browse App Catalog.
  • SCIM OKTA App Catalog
  • Now search for the SCIM. Add the SCIM 2.0 Test App (Bearer Token) application.
  • User provisioning with Okta of SCIM Standard - create application
  • Click on the Add Integration button.
  • User provisioning with Okta of SCIM Standard - add SCIM application
  • Once the app is created, go to the Provisioning menu of the application and Click on the Configure API Integration button.
  • Now click on the Enable API Integration and enter the SCIM Base URL (as SCIM connector base URL) and SCIM Bearer Token (as Authorization) from the SCIM Configuration tab of the plugin.
  • User provisioning with Okta of SCIM Standard provisioning- Enable API integration
  • Click on Test API Credentials. If the connection is established, it will show a success message.
  • Click on the Save button. After that Click on To App under the Settings option on the left side.
  • Click on Edit button and check the Create Users, Update User Attributes and Deactivate Users checkbox and click on the Save button.
  • User provisioning with Okta of SCIM Standard Create users or deactivate users
  • Then go to Assignments menu and add Users that you want to provision into your application. You can also assign groups. Members of the assigned groups will be provisioned to Atlassian module.
  • User provisioning with Okta of SCIM Standard assign people or groups SCIM
  • To enable group mapping for a group you will need to add it in the push group section. Go to Push Groups tab and click on Push Groups button. Then click on find the group by name or you can also find it by the group rule. Then you can search and select the group.
  • confluence-scim-okta-push-groups
  • After finding the group you will need to Activate Group Push to start group sync.
  • confluence-scim-okta-push-groups

Step 3: User Sync Settings

  • Select the User Sync Settings tab from the left sidebar. Here you can configure different settings about user creation and updation.
  • You can Create the directory using Create Directory option where you want SCIM Operations to be performed.
  • User provisioning with Okta of SCIM Standard Start Provisioning option
  • You can also select your Directory Type from the dropdown.
  • User provisioning with Okta of SCIM Standard Start Provisioning option
  • Enable Import Users option to import all active Okta Users.
  • The user can be automatically enabled or disabled here based on IDP configuration.
  • You also have the option to set Default Project Lead and Default Component Lead.
  • Attribute mapping enables you to map your attributes sourced from the IDP to Crowd attributes. Through this section you can map your Crowd attributes to the attributes coming from IDP. By default, email corresponds to the email/mail attribute, and displayName corresponds to the full name attribute. However, if you want to map these Crowd attributes with other attributes coming from IDP, you can use this feature to change the attribute mapping configurations.
  • User provisioning with Okta of SCIM Standard Start Provisioning option

Step 4: Group Sync Settings

  • Select the Group Sync Settings tab from the left sidebar. Here you can configure different settings for group creation and group mapping.
  • User provisioning with Azure AD of SCIM Standard Start Provisioning option
  • Here you can configure Default groups for new and all users.
  • You can set Manual Group Mapping or On-The Fly Group Mapping.

1. Manual Group Mapping -

  • Here you can manually map Crowd groups with the groups from IDP.
  • You can also configure to import IDP groups, and to keep existing users or not.
User and gruop provisioning in Crowd Manual Group Mapping

2. On-The Fly Group Mapping -

  • Here users will be assigned to groups in Crowd whose group name is the same as groups from IDP. If the group doesn't exist in Crowd then it will be created.
  • You can configure to keep the existing user groups.
User and gruop provisioning in Crowd On The Fly Group Mapping

Step 5: Backup & Restore

  • In the Backup and Restore tab you can Import and Export plugin configurations in the JSON format.
  • User and gruop provisioning in Crowd Backup and Restore

Recommended Add-Ons




Free Trial

If you don't find what you are looking for, please contact us at support-atlassian@miniorange.atlassian.net or raise a support ticket here.