Okta SSO
Manage users with Okta OIDC SSO + SCIM provisioning.
Overview
Suger is available on the Okta Integration Network (OIN), offering robust support for both OIDC Single Sign-On (SSO) and user provisioning via SCIM (System for Cross-domain Identity Management). By integrating Suger with Okta, you can centralize user authentication and streamline user management across your organization.
This guide will walk you through configuring OIDC SSO for effortless, secure logins and setting up SCIM provisioning to automate user lifecycle management—all directly from your Okta environment.
Supported Features:
- OIDC SSO:
- Service Provider (SP)-Initiated SSO (logging in from Suger)
- Identity Provider (IdP)-Initiated SSO (logging in from Okta)
- SCIM Provisioning:
- Create Users: Automatically provision Okta users in Suger.
- Update User Attributes: Sync user profile changes (e.g., role).
- Deactivate Users: Automatically deactivate Suger users when they are unassigned in Okta.
During the setup phase, users will retain access to Suger via other login methods (e.g., Google SSO) until the full switch to Okta SSO is complete. This also provides a fallback access method if SSO encounters issues.
Configuration Steps
The configuration is a four-step process. SSO and SCIM can be set up entirely through self-service in the Suger Console.
Prerequisites: You must have administrative access to your organization's Okta account.
Step 1: Initial Okta Setup & Information Gathering
First, add the Suger application from the Okta Integration Network (OIN) and enter temporary placeholder values.
-
Add the Suger App:
- In your Okta Admin Console, navigate to Applications → Browse App Catalog, search for "Suger" and add it.
- Alternatively, visit the Suger OIN App page directly.
-
Enter Placeholder Values: On the "General Settings" screen, enter the following temporary values. These will be replaced with real values provided by Suger Support later.
- Suger Organization ID:
SugerOrg(This is a fake organization ID. It will be updated to the your real Suger organization ID later) - SCIM endpoint URL:
https://www.suger.io/ - Click Done.
- Suger Organization ID:
-
Collect OIDC Credentials:
- Open the Suger app in Okta and navigate to the Sign On tab.
- Copy the Client ID and Client Secret.
- Note your Okta Domain (e.g.,
dev-12345678.okta.com).
Step 2: Configure SSO Connection
Configure your Okta SSO connection through our self-service setup:
- Navigate to Settings > SSO in Suger Console
- Click "Set up SSO"
- The system will generate a secure 24-hour setup ticket and redirect you to the Auth0 configuration wizard
- Follow the wizard prompts to connect your Okta Identity Provider using the credentials you collected in Step 1
- The connection will be active immediately upon completion
If you only need SSO authentication, you can stop here. Your Okta SSO is ready to use. User management will be handled manually in the Suger Console.
If you need SCIM user provisioning for automated user lifecycle management (create, update, deactivate users), continue to Step 3 to configure SCIM directly from the Suger Console.
SCIM provisioning provides automated user creation, updates, deactivation, and role mapping. This is optional and only needed if you want full user lifecycle automation.
Step 3: Configure SCIM Provisioning (Optional)
This step is only required if you need SCIM user provisioning. If you only configured SSO in Step 2, you can skip this section.
You can generate the SCIM credentials directly from the Suger Console:
-
Navigate to the SCIM Configuration: In the Suger Console, go to Settings > SSO. Find your SSO connection and click the SCIM dropdown to expand the SCIM provisioning section.
-
Generate a SCIM API Token: Click "+ Generate New Token". A dialog will appear with your token.
warningCopy and save your SCIM API Token immediately. Suger does not store this token — you will not be able to view it again. If you lose it, you can delete the token and generate a new one.
-
Copy the SCIM Credentials: After the token is generated, the following information will be available in the SCIM section. Copy them for use in Okta:
- Organization ID
- SCIM Endpoint URL
- SCIM API Token (from the previous step)
Use these values to complete the setup in Okta.
A. Update General Settings
- In the Suger app in Okta, navigate to the General tab and click Edit in the "App Settings" section.
- Replace the placeholder values with the Suger Organization ID and SCIM Endpoint URL provided by Suger Support.
- Ensure the SCIM endpoint URL ends with a trailing slash (
/). - Ensure the Suger Organization ID has no leading or trailing spaces.