Skip to main content

User Provisioning Setup for Okta Guide

Enable automatic user creation and management in Knak using Okta's System for Cross-domain Identity Management (SCIM) integration.

Updated over 2 weeks ago

Overview

This guide walks you through setting up user provisioning with Okta using OAuth 2.0 and Knak’s SCIM API. By the end, you’ll be able to automate user creation and updates from Okta to Knak.

📌 Click here for details on Set Up Single Sign-On (SSO) with Okta


Step 1: Create a New OAuth Application in Knak

To activate SCIM-based provisioning, create an OAuth 2.0 app in Knak.

2. Click Create new OAuth application.

3. Name the app User Provisioning.

4. Set the Redirect URI to:

<https://system-admin.okta.com/admin/app/cpc/><okta_instance>_<okta_app_name>/oauth/callback


Replace:

  • <okta_instance>: This is the name of your Okta organization. You can find it in your URL, for example:
    https://<okta_instance>.okta.com/
    (Example: If your URL is https://mycompany.okta.com, then your instance is mycompany.)

  • <okta_app_name>: This is the ID of the app you created for Single Sign-On (SSO) in Knak.

    • You can find it in the URL when you open the app's settings in Okta:
      https://<okta_instance>-admin.okta.com/admin/app/<okta_instance>_<okta_app_name>

5. Check the Confidential box.

6. Click Create.

Important: ✅ Save the Client ID and Client Secret. You'll need them in Okta.


Step 2: Connect the SCIM Service in Okta

1. Log into your Okta Admin Console.

2. Go to the Knak app you created for SSO.

3. Under General, check Enable SCIM provisioning.

4. A new tab called Provisioning appears. Click it.

5. Fill out the following fields:

Field

Value

SCIM Version

2.0

SCIM connector base URL

Unique ID for users

email

Supported provisioning actions

- Import new users, Push new users and profile updates

Authentication Mode

OAuth 2

Token endpoint

Authorization endpoint

Client ID

Copied from new OAuth app

Client Secret

Copied from new OAuth app

6. Go to the Integration tab. Click Authenticate with [Knak App Name]. Complete the authorization steps.

7. Go to the To App tab. Enable Create Users.

8. You can now assign users in Okta and they will be provisioned into Knak.

The invited users will be assigned to the collaborator role by default and have access to all brands. An admin from your team will need to go into Knak to set the proper roles and brand scoping.


Handling Previously Assigned Users

If users were assigned before SCIM provisioning was set up, Okta will display a warning.

You can resolve this by importing users from Knak to Okta. This maps existing Knak users to Okta profiles and creates any missing ones.


Need more help? Contact support via live chat within Knak using the chat bubble in the bottom right corner or email support@knak.com

Did this answer your question?