# SCIM provisioning with Okta

*Automatic provisioning through SCIM is available starting in* [*Enterprise Edition*](https://www.sonarsource.com/plans-and-pricing/enterprise/)\*. \*

You can enable SCIM to automate user and group provisioning from Okta to SonarQube. For an overall understanding of the feature, read the SCIM [overview](https://docs.sonarsource.com/sonarqube-server/10.3/instance-administration/authentication/saml/scim/overview "mention") page.

## Prerequisites <a href="#prerequisites" id="prerequisites"></a>

You have a working [how-to-set-up-okta](https://docs.sonarsource.com/sonarqube-server/10.3/instance-administration/authentication/saml/how-to-set-up-okta "mention").

## Configuring SonarQube <a href="#configuring-sonarqube" id="configuring-sonarqube"></a>

To enable SCIM provisioning in SonarQube:

1\. go to **Administration** > **Authentication** > **SAML**

2\. Click **Automatically provision user and group with SCIM** under the **Provisioning** section. Click **Save** and validate the popup if you are sure you want to enable SCIM.

3\. Click **Save** and validate the popup if you are sure you want to enable SCIM.

SCIM is now enabled in SonarQube, it will handle all queries coming from Okta about users and groups.

## Configuring Okta <a href="#configuring-okta" id="configuring-okta"></a>

**Step 1**: From your Okta board, choose *your SonarQube application* > **General** > **App Settings** > **Edit**.

**Step 2**: Check **Enable SCIM provisioning** and click on **Save**. This will create a **Provisioning** tab.

**Step 3**: Choose the newly created **Provisioning** tab and click on **Edit.**

![](https://353248219-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fl622HnhaCz6xSuy6XTfl%2Fuploads%2Fgit-blob-9cfa8fa1b2de609ee3f9a6848490ce35d72d53a5%2Fe1212a858ba15943b2dbfba1134e8ccfb6cc3544.jpg?alt=media)

**Step 4**: Configure the SCIM Connection fields as follows:

* **SCIM connector base URL**: `<Your SonarQube URL>/api/scim/v2`
* **Unique identifier field for users**: *`userName`*
* **Supported provisioning actions**: enable **Push New Users**, **Push Profile Updates** and **Push Groups**, as shown in the above picture
* **Authentication Mode**: select **HTTP Header**

**Step 5**: Click **Save**. Under the **Push Groups** tab that appears, select the groups to provision to SonarQube. You have two options:

* select them by name, one by one, by clicking **+ Push Groups** > **Find groups by name**.
* create a rule to match multiple groups at once. Click **+ Push Groups** > **Find groups by rule**, give it the name and the criteria of your choice, then click **Create rule**. Note that Okta does not support regular expressions here and that matching groups are immediately provisioned when the rule is created.

![](https://353248219-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fl622HnhaCz6xSuy6XTfl%2Fuploads%2Fgit-blob-7f5f11a7223f53d6b28682ccbe65d97eaac1822f%2F918cde0c8e1cd0091bc9643416feb85e2b792b3c.png?alt=media)

![](https://353248219-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fl622HnhaCz6xSuy6XTfl%2Fuploads%2Fgit-blob-fe97ef0da41e0e2c10f75025042c5520b2872597%2Fd3e5795ef61566b96b0dca5885e7bf104a0b1c19.png?alt=media)

**Step 6:** In SonarQube, [generating-and-using-tokens](https://docs.sonarsource.com/sonarqube-server/10.3/user-guide/user-account/generating-and-using-tokens "mention") from an admin account and copy the token into Okta’s **HTTP Header** > **Bearer** field\*\*.\*\* We strongly advise that the admin account used is a local one (not SCIM managed) for safety reasons.

**Step 7**: To check that the SCIM connection is valid, click on **Test Connector Configuration**. A green checkmark indicates that all the fields are properly filled.

**Step 8**: Click **Save**.

**Step 9**: In the next screen, click **Edit** and check the **Create Users**, **Update User Attributes** and **Deactivate Users** provisioning options.

![Screenshot of the SCIM Provisioning to App page in Okta.](https://353248219-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fl622HnhaCz6xSuy6XTfl%2Fuploads%2Fgit-blob-88f46467771ba37bd1e263704c41e45eb98a3f36%2Fe7899126e856b0e91a50caabd1c8a0a816aa22ea.png?alt=media)

Screenshot of the SCIM Provisioning to App page in Okta.

**Step 10**: Click **Save**. Okta users will be automatically provisioned with SonarQube.

Note that if a user gets suspended in Okta, the corresponding user account remains unchanged in SonarQube.

## Provisioning already assigned users <a href="#provisioning-already-assigned-users" id="provisioning-already-assigned-users"></a>

Users that are assigned before SCIM is enabled are not automatically provisioned. In the UI, an exclamation mark is displayed next to their names in the **Assignments** tab:

![Screenshot showing the Provision User button in Okta.](https://353248219-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fl622HnhaCz6xSuy6XTfl%2Fuploads%2Fgit-blob-fa8d7edcc2f6c41c663d5c11de84cac446b8ca51%2Fef900448be8d85e8907c6a9b284a03c324ec79df.png?alt=media)

Screenshot showing the Provision User button in Okta.

To force the provision of these users, click on **Provision User**. The exclamation mark should disappear, meaning that the users have been provisioned.
