In the left hand panel, navigate to “Applications” → “Applications”
Click “Browse App Catalog” button:
In the “Search” box, search for “SCIM 2.0 Test App (OAuth Bearer Token)” and select it from the results:
Click on the “+ Add integration” button:
In the “Application label” box
Change “SCIM 2.0 Test App (OAuth Bearer Token)” to “Row Zero 2.0 App (OAuth Bearer Token)”
Uncheck “Application Visibility”
Uncheck “Automatically log in when user land on login page”
Click the “Next” button:
In the “Sign-On Options” section, do not select anything (as the Okta application will only be utilized for SCIM) and click the “Done” button:
Step 2: Configure the SCIM Connection
Inside the “Row Zero 2.0 App (OAuth Bearer Token)” application, click on the “Provisioning” tab and then the “Configure API Integration” button:
Click on the “Enable API Integration” checkbox, enter “https://scim.rowzero.io/scim/v2” for “SCIM 2.0 Base Url”, and enter the “OAuth Bearer Token” provided to you by Row Zero:
Click the “Test API Credentials” button and verify a successful response is received, then click the “Save” button:
Step 3: Enable User Provisioning Features
In the “Row Zero 2.0 App (OAuth Bearer Token)” application, under the “Provisioning” tab, select “Settings —> To App”:
Click the “Edit” link, and select “Create Users”, “Update User Attributes”, and “Deactivate Users” checkboxes:
Click the “Save” button:
On the same page, under “Row Zero 2.0 App (OAuth Bearer Token) Attribute Mappings”, click on the “Go to Profile Editor” button:
Under the “Attributes” section click on the “+ Add Attribute” button:
If an active attribute is part of your user profiles, create an “Active” attribute with the following and then click the “Save” button:
Under the “Attributes” section click on the “Mappings” button:
Select the “Okta User to Row Zero SCIM 2.0 (OAuth Bearer Token)” tab:
Select “Do not map” for every mapping other than “userName”, “displayName”, and “active” (if applicable to your user profiles):
Click the “Save Mappings” button:
Step 4: Assign Groups and Users
Navigate back to “Applications” → “Applications” and click on the “Row Zero 2.0 App (OAuth Bearer Token)” application:
Under the “Push Groups” tab press the “Push Groups” button and select “Find groups by name”:
Select the “Push group memberships immediately” checkbox, enter the group name(s) you’d like to sync to Row Zero, and when done click the “Save” button:
Under the “Assignments” tab press the “Assign” button and select “Assign to People” for any user in your application that could possibly use Row Zero in order to activate type ahead completion in the secure sharing feature:
Note: If Okta makes you populate the “Given name” and “Family name” attributes when assigning the user, populate them with relevant values; ultimately these will be ignored by Row Zero in favor of the display name.
Under “Assignments” tab press the “Assign” button and select “Assign to Groups” and assign any of the groups defined under the “Push Groups” tab:
Note: The “Push Groups” tab tells Okta to sync the group records but not the group membership, the “Assignments” tab in relation to groups tells Okta to sync the members of the group.