Configure Okta for Genesys Cloud SCIM (Identity Management)
To use Genesys Cloud SCIM (Identity Management), configure Okta to sync user entities to Genesys Cloud. In Okta Integration Network, add an application that you configure to work with the SCIM APIs. Then link Okta groups to Genesys Cloud.
- Genesys Cloud OAuth client. For more information, see Create an OAuth client (Genesys Cloud SCIM tab).
Token generation
Generate a token to use for Provisioning.
- Open Postman.
- Import the Genesys Cloud Client Credentials collection for the appropriate collection format from the following links:
- Collection Format v1: https://www.getpostman.com/collections/06d3bac569ec729f0a59
- Collection Format v2: https://www.getpostman.com/collections/b4f0048c7fc833b914c2
- Replace {{environment}} in the POST API call with the login URL where your Genesys Cloud organization is located, for example, https://login.mypurecloud.com/oauth/token. For a list of regional URLs, see Platform API (Genesys Cloud Developer Center).
- Under Authorization, add the following information:
- Username: Enter the Client ID from the Genesys Cloud OAuth client you created.
- Password: Enter the Client Secret from the Genesys Cloud OAuth client you created.
- Click Send. Your access token appears in the response body. You will use this token when you provision Okta. See the Provisioning section.
Application setup
Add the Genesys Cloud application.
- Log in to Okta Integration Network.
- Click Add Application.
- Search for and click Genesys Cloud.
- Click Add.
Sign On
Configure the Application username format.
- Under Settings, click Edit.
- For Application username format, select Email.
- Click Save.
Provisioning
The Genesys Cloud SCIM application in Okta supports the following provisioning features:
To App
- (Optional) Enable Create Users.
- (Optional) Enable Update User Attributes. This setting allows Okta to update a user’s attributes when the app is assigned. Future attribute changes in Okta user profiles automatically replace the corresponding attribute value in the Genesys Cloud application.
- (Optional) Enable Deactivate Users. This setting deactivates users account in the Genesys Cloud application when the account is unassigned or deactivated in Okta.
- (Optional) Enable Sync Password. This setting creates a password for each user and pushes the passwords to the Genesys Cloud application.
- (Optional) Attribute mappings. The Okta application automatically configures mappings for multiple phone numbers and email addresses. You can modify these mappings or add new attributes to the existing mappings.
The mappings allow a one-way push from Okta to Genesys Cloud. For a table that shows the relationship between SCIM and Genesys Cloud fields, see SCIM and Genesys Cloud field mappings.
Important: Genesys Cloud converts any phone numbers from Okta to the E.164 format. As a result, if you configure Okta to pull phone numbers from Genesys Cloud that are different, you will cause continual updates due to differences in the phone number formatting. To prevent continual updates, convert phone numbers in Okta to conform to the E.164 format.
Integration
Enter admin credentials and test the connection.
- Under Provisioning, click Integration.
- Add the following information.
- SCIM Domain: Enter the URL of the SCIM endpoint. Use the domain associated with the location of your Genesys Cloud organization:
Genesys Cloud region Domain Americas (Canada) api.cac1.pure.cloud Americas (US East) api.mypurecloud.com Americas (US West) api.usw2.pure.cloud Asia Pacific (Mumbai) api.aps1.pure.cloud Asia Pacific (Seoul) api.apne2.pure.cloud Asia Pacific (Sydney) api.mypurecloud.com.au Asia Pacific (Tokyo) api.mypurecloud.jp EMEA (Dublin) api.mypurecloud.ie EMEA (Frankfurt) api.mypurecloud.de EMEA (London) api.euw2.pure.cloud - API Token: Enter the bearer token. The bearer token is the access token returned when you made an API call in Postman. See the Token generation section.
- SCIM Domain: Enter the URL of the SCIM endpoint. Use the domain associated with the location of your Genesys Cloud organization:
- Click Test API Credentials.
- Click Save.
Groups
Link groups that you want to sync from Okta to Genesys Cloud.
- Provisioning cannot create or delete groups in Genesys Cloud.
- Group names must be the same (case insensitive) in both applications. Otherwise, Okta cannot sync user membership to Genesys Cloud.
- Click the Push Groups tab.
- Click the Push Groups button and search for groups to push. Tip: Genesys recommends linking groups that are exact matches in both Okta and Genesys Cloud. Otherwise, Okta will attempt to rename the group, which could cause confusion if resources other than Okta and the Genesys Cloud application use this group.
Notes: The Push Now action of group sync has an unusual behavior of removing a large number of members from a group. If you use the group to assign roles in Genesys Cloud, a large number of members of the group can lose permissions for an extended time. Genesys Cloud SCIM blocks any single action that tries to remove more than 1000 members from a group and protects you from this unusual behavior of Push Now action. - Click Save.
Link large groups
To link large existing groups, use the following procedure:
- Click the Push Groups tab.
- Edit the group rule to empty the group.
- To configure the group under Push Groups, click Push Groups and add the Okta group so it starts syncing to the app.
- Update the group rule again to apply the correct conditions so users are added back into the group and pushed to the app.
- If the sync appears to stop, toggle the group’s status from Active to Inactive, then back to Active in the Push Groups list to restart the job.
If you use the Push Status dropdown and select Push Now, Okta attempts to remove all users from the target group in the application and starts dropping users. Then, the job can stall without showing an error. To recover from this state:
- In the Push Groups tab, unlink the Okta group from the app group. Do not delete the group in the application.
- Add the same Okta group again using the +Push Groups option. Okta will stop the stuck removal job and begin re-adding any missing users to the app group.
For more information, see Configure Group Linking in the Okta documentation.
For information about issues, see Troubleshoot Genesys Cloud SCIM (Identity Management).
For information about Genesys Cloud SCIM (Identity Management), see About Genesys Cloud SCIM (Identity Management) and Genesys Cloud SCIM (Identity Management) overview (Genesys Cloud Developer Center).
