Work In Progress
This guide for Okta review at this time until it is approved.
This guide will take you through the steps needed to perform in both Teamgo and Okta to configure automatic user provisioning with SCIM (System for Cross-domain Identity Management).
Features
Following features are supported by Teamgo:
Create Users. When users in Okta that are assigned to Teamgo application in Okta are automatically added as users in your organization in Teamgo.
Update Users: Users attributes updated in Okta will update automatically in Teamgo
Deactivate users. When users in Okta is removed from Teamgo application, it automatically removed in Teamgo.
Teamgo does not support Sync Password.
Requirements
Okta integration is available on Enterprise plans.
How to Configure
Please follow the instruction below carefully.
Step1: Configure in Teamgo
Login to the Teamgo Dashboard
Click on the user profile icon and go to Settings
Under Employee Directory, look for Okta and click on Enable button
4. Click on Configure
5. Copy the Secret Token from the Credentials tab, will be required for step 5.
Step 2: Configure in Okta
Add Teamgo Visitor Sign-in in the OIN. If you already have it installed for SSO/SAML, you can use the same application.
Go to the Sign On tab and make sure the Application username format is set to Email.
Go to Provisioning Tab
Under SCIM connector base URL, enter https://api.signin.systems/v1/scim
โIn Authentication Mode, select HTTP Header
Paste the Secret Token into the Bearer field, then click Save.
In the Provisioning Section, click on To App tab and click Edit. Then enable the SCIM functionality you would like to support. Then click Save.
Troubleshooting
If the user already exists in Teamgo, the user profile will be overridden.
Password will not be syncronised
Synchronized users' notifications will be set based on default notification settings
If Sync and assigned users to locations and kiosks as host is selected and no matches found, user will not be added to Teamgo.