ZIdentity
Configuring Okta as an External IdP
This guide provides information on how to configure Okta as an external Identity Provider (IdP) for ZIdentity to facilitate single sign-on (SSO) to various Zscaler services for admin access management. You can configure Okta as an external IdP to enable SSO to ZIdentity using OpenID Connect (OIDC) or Security Assertion Markup Language (SAML) authentication protocols.
Zscaler and Okta are technology partners. To learn more about integrating Zscaler and Okta, see the Zscaler and Okta Deployment Guide.
Depending on the authentication protocol, you can provision users to ZIdentity from Okta using Just-in-Time (JIT) provisioning or System for Cross-domain Identity Management (SCIM) provisioning.
If you want to leverage step-up authentication, it is recommended to use OIDC-based integrations as most IdPs only support step-up authentication with the OIDC protocol.
- OIDC-Based Authentication via OIN App IntegrationClose
This section provides information on how to use the Okta Integration Network (OIN) app integration to configure Okta as your OpenID Provider (OP) for ZIdentity for facilitating single sign-on (SSO) to various Zscaler services for admin access management.
An OIN-based integration uses SCIM-based provisioning and Zscaler recommends the OIN-based integration. If your Okta subscription does not include SCIM provisioning, Zscaler recommends using the custom OIDC application as Okta does not support sending custom claims such as
Groups
orDepartments
with the OIN application. To learn more, see OIDC-Based Authentication via Custom App Integration.Prerequisites
Ensure that you have:
- An Okta account with admin privileges
- A SCIM provisioning subscription for Okta
- An existing user directory in Okta
- A ZIdentity account with an admin role that allows you to add an IdP configuration
Supported Features
The following features are supported for OIDC and SCIM:
Supported Features for OIDC
- JIT Provisioning
- IdP-Initiated SSO
- SP-Initiated SSO
After setting up the OIN-based integration, ZIdentity administrators can log in to the ZIdentity Admin Portal using Okta.
To log in to ZIdentity Admin Portal via Okta:
Go to the ZIdentity Admin Portal using your vanity URL specific to your ZIdentity tenant. For example, the vanity URL has the following format:
https://customername.zslogin.net/
Enter your username registered with Okta.
If the username is valid, you are redirected to the Okta page for authentication. After successful authentication, you are logged in to the ZIdentity Admin Portal.
Supported Features for SCIM
- Create Users
- Update User Attributes
- Deactivate Users
- Group Push
Configuring Okta as OP for ZIdentity
To set up Okta as an OP for ZIdentity:
- 1. Configure OIN app integration for ZIdentity in Okta.
- Log in to the Okta Admin Console.
- Go to Applications > Applications.
Click Browse App Catalog.
- Search for
zscaler
. From the search results, locate and click the Zscaler app.
In the app details page, click Add Integration.
In the Add Zscaler window, enter a name for the Application label field.
Click Done.
An OIN app for ZIdentity is added.
In the application page, on the Sign On tab, copy the Client ID and Client secret values. These values are used in a subsequent step when configuring Okta as an OP for ZIdentity.
To obtain the metadata URL, right-click the OpenID Provider Metadata text, and copy the URL. This value is used in a subsequent step when configuring Okta as an OP for ZIdentity. The metadata URL has the following format:
https://
<your_subdomain>
.okta.com/oauth2/default/.well-known/openid-configuration
- 2. Set up Okta as an OP for ZIdentity.
- Log in to the ZIdentity Admin Portal.
- Go to Integration > External Identities.
- Click Add Primary IdP (or Add Secondary IdP).
The Add Primary Identity Provider or Add Secondary Identity Provider window appears. - On the Basic tab:
Under the General section:
- Name: Enter a name for the IdP.
- Identity Vendor: Select Okta from the drop-down menu.
- Domain: Select the domain for which the IdP is responsible for authenticating the users. This allows the Zscaler service to display the correct IdP to authenticate an incoming user.
- Protocol: Select OIDC.
- Status: Select Enabled.
Login ID Attribute: Enter an attribute to map it with the Login ID attribute. You can use any attribute that has the email address format e.g., <user_name>@domain.com>. However, Zscaler recommends using the
preferred_username
as the Login ID attribute.- If you are using
email
as the Login ID attribute, ensure that your email domain matches with one of the domains added to ZIdentity for the Primary Email attribute. - You can use any email domain for your primary email if you are using any attribute other than email as the source for the Login ID attribute.
- Ensure that the attribute you enter in the Login ID field matches exactly with the attribute received in the ID tokens.
- If you are using
Under the OIDC Configuration section:
- Enter the following value for the Metadata URL field copied from the Okta Admin Console.
- Click Fetch.
Copy the Redirect URI value. This value is used in a subsequent step.
If you are configuring Okta as your secondary IDP, the final segment in the Redirect URI is required for configuring Initiate Login URI in the Okta Admin Console.
- Paste the Client ID and Client Secret values copied from the Okta Admin Console.
- Add
email
andprofile
to the Requested Scopes field.
- Click Save.
- Go to the Okta Admin Console, and go to the OIN app added for ZIdentity.
- On the Sign On tab:
- Click Edit.
- Paste the Redirect URI copied from ZIdentity Admin Portal.
- Enter the following value for the Initiate Login URI field:
If you are configuring Okta as your primary IdP in the ZIdentity Admin Portal:
https://<your_domain>.zslogin.net/?idp_id=default
If you are configuring Okta as your secondary IdP in the ZIdentity Admin Portal:
https://<your_domain>.zslogin.net/?idp_id=<final_segment_from_redirect_URI>
- Click Save.
- 3. Provision users for ZIdentity using JIT or SCIM provisioning.
- JIT provisioning
- In the ZIdentity Admin Portal, go to Integration > External Identities.
- Locate the IdP entry created for Okta under the Primary Identity Provider (or Secondary Identity Providers) tab and click the Edit icon.
- In the Edit Primary IdP (or Edit Secondary IdP) window:
- Go to the Provisioning tab and configure the following:
- Select Enable Just-in-time (JIT) Provisioning.
Map the required attributes. The mapping of the
Primary Email
attribute is mandatory as it is required for functionalities, such as password resetting and multi-factor authentication. By default, the following attributes in ID tokens are mapped with the corresponding user attributes in ZIdentity.Attribute in ID Tokens Default ZIdentity User Attributes given_name First Name family_name Last Name name Display Name - If the external IdP is configured to send different attributes for
First Name
,Last Name
, orDisplay Name
, then you must map those attributes. For example, if the ID token from the external IdP includesSurname
instead offamily_name
, then you must map it with theLast Name
user attribute in ZIdentity. While mapping attributes, ensure that the attributes you enter in the Just-in-time Attribute field match exactly with the attributes that would be received in the ID tokens.
- If the external IdP is configured to send different attributes for
Click Update.
- In the Okta Admin Console, go to Applications > Applications.
- Open the OIN app created for ZIdentity and go to the Assignments tab.
Add users and groups to the application using the Assign drop-down menu.
The JIT provisioning with Okta users is configured for ZIdentity.
- Go to the Provisioning tab and configure the following:
- SCIM provisioning
- In the ZIdentity Admin Portal, go to Integration > External Identities.
- Locate the IdP entry created for Okta under the Primary Identity Provider (or Secondary Identity Providers) tab and click the Edit icon.
- In the Edit Primary IdP (or Edit Secondary IdP) window:
- Go to the Provisioning tab.
- Select Enable SCIM Provisioning.
Copy the SCIM Endpoint URL. This value is used in a subsequent step.
The SCIM Endpoint URL field appears only if the configurations for the IdP in the Basic tab are completed and saved.
- Click Generate Token and copy the Bearer Token value. This value is used in a subsequent step.
(Optional) Map the SCIM attribute (e.g.,
addresses
) with the corresponding ZIdentity user attribute. This mapping is required only for attributes that need to be mapped to a custom user attribute in ZIdentity. To learn more about the SCIM attributes that require custom attribute mapping, see Understanding SCIM.
- Click Update.
- Go the Okta Admin Console, and go to the OIN app added for ZIdentity.
- On the Provisioning tab:
Click Configure API Integration.
- Select Enable API integration.
- Paste the SCIM Endpoint URL value copied from the ZIdentity Admin Portal to the Base URL field.
- Paste the Bearer Token value copied from the ZIdentity Admin Portal to the API Token field.
- Click Test API Credentials.
Click Save.
Click Edit.
Under the Provisioning to App section, enable the Create Users, Update Users to Attributes, and Deactivate Users options.
- Click Save.
- On the Assignments tab, click the Assign drop-down menu, and select an option to assign users or groups:
- Assign users
Select Assign to People.
Search and locate users you want to assign, and click Assign.
- Click Done.
- Assign groups
Select Assign to Groups.
Search and locate the groups you want to assign, and click Assign.
- Assign users
To sync groups and the assigned users or members from Okta to ZIdentity, go to the Push Groups tab, and select an option to push groups by name or rule:
- Push Groups by name
Select the Find groups by name option from the Push Groups drop-down menu.
By default, the Push group memberships immediately option is selected to push groups immediately to ZIdentity. However, you can disable it if you do not want to do this.
Enter the name of the group that you want to push and select the group from the drop-down menu.
- Click Save or click Save & Add Another if you want to push multiple groups.
- Click Close.
On the Push Groups tab, click By name on the left-side navigation and verify that all your groups have been added. Ensure that the Push Status for each group is Active.
- Push Groups by rule
Select the Find groups by rule option from the Push Groups drop-down menu.
- In the Push groups by rule window:
- Rule name: Enter a name for the rule.
- Group name: Select a match condition from the drop-down menu and enter a string that should be used to find a group with the name matching the condition. For example, you can select Contains as the match condition and enter
Admins
as the string to match all groups that has the string "Admin" and push them to ZIdentity. Group description: Select a match condition from the drop-down menu and enter a string that should be used to find a group with the description matching the condition. For example, you can select Contains as the match condition and enter
For Admins
as the string to match all groups that has the string "For Admins" in the description and push them to ZIdentity.By default, the Immediately push groups found by this rule option is selected to push groups immediately to ZIdentity. However, you can disable it if you do not want to do this.
- Click Create Rule.
On the Push Groups tab, select the rule name created in the previous step under the By rule option on the left-side navigation, and verify that all of your groups have been added. Ensure that the Push Status for each group is Active.
To learn more about group push, refer to the Okta technical documentation.
- Push Groups by name
The SCIM provisioning with Okta users is configured for ZIdentity.
Close
- JIT provisioning
- 4. Enable step-up authentication.
You can configure step-up authentication to extend the existing authentication process by requiring multi-factor authentication (MFA) when needed, ensuring that access to high-risk or sensitive data is protected.
Before configuring step-up authentication, make sure you have configured authentication levels and access policies. To learn more, see Understanding Step-Up Authentication.
To enable step-up authentication:
- In the ZIdentity Admin Portal, go to Integration > External Identities.
- Locate the IdP entry created for Okta under the Primary Identity Provider (or Secondary Identity Providers) tab and click the Edit icon.
- In the Edit Primary IdP (or Edit Secondary IdP) window:
- Go to the Advanced tab.
Under the Levels to Authentication context mapping section, enter the ACR Claim value for each authentication level. To learn more about the supported ACR Claims in Okta, refer to the Okta Technical documentation.
Ensure that you map proper ACR claims for each level depending on the hierarchy. The highest level of authentication must be mapped to the ACR value for the strongest context.
- Click Update.
- OIDC-Based Authentication via Custom App IntegrationClose
This section provides information on how to configure Okta as your OpenID Provider (OP) for ZIdentity to facilitate single sign-on (SSO) to various Zscaler services for admin access management.
Prerequisites
Ensure that you have:
- An Okta account with admin privileges
- An existing user directory in Okta
- A ZIdentity account with an admin role that allows you to add an IdP configuration
Configuring Okta as OP for ZIdentity
To set up Okta as an OP for ZIdentity:
- 1. Configure app integration for ZIdentity in Okta.
- Log in to the Okta Admin Console.
- Go to Applications > Applications.
Click Create App Integration.
In the Create a new app integration window:
- Sign-in method: Select the OIDC - OpenID Connect option.
- Application type: Select the Web Application option.
- Click Next.
The New Web App Integration window appears.
- In the New Web App Integration window:
Under the General Settings section:
- App integration name: Enter a name for the ZIdentity integration.
- Ensure that Grant type is set to Authorization Code.
Under the Assignments section:
- Controlled Access: Select an appropriate option.
- Disable the Enable immediate access with Federation Broker Mode option.
In the application page, under the General tab, copy the Client ID and Client Secret values.
- 2. Set up Okta as an OP for ZIdentity.
- Log in to the ZIdentity Admin Portal.
- Go to Integration > External Identities.
- Click Add Primary IdP (or Add Secondary IdP).
The Add Primary Identity Provider or Add Secondary Identity Provider window appears. - On the Basic tab:
Under the General section:
- Name: Enter a name for the IdP.
- Identity Vendor: Select Okta from the drop-down menu.
- Domain: Select the domain for which the IdP is responsible for authenticating the users. This allows the Zscaler service to display the correct IdP to authenticate an incoming user.
- Protocol: Select OIDC.
- Status: Select Enabled.
Login ID Attribute: Enter an attribute to map it with the Login ID attribute. You can use any attribute that has the email address format e.g., <user_name>@domain.com>. However, Zscaler recommends using the
preferred_username
as the Login ID attribute.- If you are using
email
as the Login ID attribute, ensure that your email domain matches with one of the domains added to ZIdentity for thePrimary Email
attribute. - You can use any email domain for your primary email if you are using any attribute other than email as the source for the Login ID attribute.
- Ensure that the attributes you enter in the Login ID field match exactly with the attribute that would be received in the ID tokens.
- If you are using
Under the OIDC Configuration section:
Enter the following value for the Metadata URL field:
https://
<your_subdomain>
.okta.com/oauth2/default/.well-known/openid-configuration- Click Fetch.
- Copy the Redirect URI value.
- Paste the Client ID and Client Secret values copied from the Okta Admin Console to the respective fields.
- Add
email
andprofile
to the Requested Scopes field.
- Click Save.
- Go to the Okta Admin Console, and go to the application integration created for ZIdentity.
- Under the General tab:
- Go the General Settings section.
Click Edit.
Under the Login section, paste the Redirect URI value copied from the ZIdentity Admin Portal in a previous step to the Sign-in redirect URIs field.
- Click Save.
- 3. Provision users for ZIdentity.
This section explains how to provision Okta users in ZIdentity Admin Portal using Just-in-Time (JIT) provisioning. Okta does not support SCIM provisioning for custom OIDC applications. For configuring SCIM-based provisioning using Okta, Zscaler recommends using a SAML app integration.
- a. (Optional) Configure Okta to retrieve group membership information
- In the Okta Admin Console, go to Security > API.
Click the Edit icon for the authorization server.
- Under the Scopes tab:
Click Add Scope.
Enter a name for the scope. For example, enter
Groups-Scope
.Click Create.
The custom scope is added to the authorization server.
- Under the Claims tab:
Click Add Claim.
- Enter a name for the claim. For example, enter
Groups
. - Include in the Token Type: Select ID Token and select Always from the respective drop-down menus.
- Value type: Select Groups from the drop-down menu.
- Filter: Select Match regex from the drop-down menu and enter
.*
to return all of the user's groups. Include in: Select The following scopes and add the scope created in step iii (i.e.,
Groups-Scope
).Click Create.
The custom claim is added to the authorization server.
- b. Configure JIT provisioning in ZIdentity Admin Portal
- In the ZIdentity Admin Portal, go to Integration > External Identities.
- Locate the IdP entry created for Okta under the Primary Identity Provider (or Secondary Identity Providers) tab and click the Edit icon.
In the Edit Primary IdP (or Edit Secondary IdP) window:
- Go to the Provisioning tab.
- Select Enable Just-in-time (JIT) Provisioning.
- Just-in-time User Group Attribute: Enter the claim name created for group information retrieval (i.e.,
Groups
). This retrieves the group membership information of the users from Okta. Map ZIdentity user attributes with the appropriate Okta attributes as necessary. The mapping of the
Primary Email
attribute is mandatory as it is required for functionalities, such as password resetting and multi-factor authentication. By default, the following attributes in ID tokens are mapped with the corresponding user attributes in ZIdentity.Attribute in ID Tokens Default ZIdentity User Attributes given_name First Name family_name Last Name name Display Name - If the external IdP is configured to send different attributes for First Name, Last Name, or Display Name, then you must map those attributes. For example, if the ID token from the external IdP includes
Surname
instead offamily_name
, then you must map it with theLast Name
user attribute in ZIdentity. While mapping attributes, ensure that the attributes you enter in the Just-in-time Attribute field match exactly with the attributes that would be received in the ID tokens.
- If the external IdP is configured to send different attributes for First Name, Last Name, or Display Name, then you must map those attributes. For example, if the ID token from the external IdP includes
Click Update.
The JIT provisioning with Okta users is configured for ZIdentity.
- a. (Optional) Configure Okta to retrieve group membership information
- 4. Enable step-up authentication.
You can configure step-up authentication to extend the existing authentication process by requiring multi-factor authentication (MFA) when needed, ensuring that access to high-risk or sensitive data is protected.
Before configuring step-up authentication, make sure you have configured authentication levels and access policies. To learn more, see Understanding Step-Up Authentication.
To enable step-up authentication:
- In the ZIdentity Admin Portal, go to Integration > External Identities.
- Locate the IdP entry created for Okta under the Primary Identity Provider (or Secondary Identity Providers) tab and click the Edit icon.
- In the Edit Primary IdP (or Edit Secondary IdP) window:
- Go to the Advanced tab.
Under the Levels to Authentication context mapping section, enter the ACR Claim value for each authentication level. To learn more about the supported ACR Claims in Okta, refer to the Okta Technical documentation.
Ensure that you map proper ACR claims for each level depending on the hierarchy. The highest level of authentication must be mapped to the ACR value for the strongest context.
- Click Update.
- SAML-Based AuthenticationClose
This section provides information on how to configure Okta as the SAML Identity Provider (IdP) for ZIdentity to facilitate single sign-on (SSO) to various Zscaler services for admin access management.
Prerequisites
- A subscription to Okta
- An existing user directory in Okta
- A ZIdentity account with an admin role that allows you to add an IdP configuration
Configuring Okta as IdP for ZIdentity
To set up Okta as an idP for ZIdentity:
- 1. Set up Okta as an IdP for ZIdentity.
- Log in to the ZIdentity Admin Portal.
- Go to Integration > External Identities.
Click Add Primary IdP (or Add Secondary IdP).
The Add Primary Identity Provider (or Add Secondary Identity Provider) window appears.
On the Basic tab:
- Under the General section:
- Name: Enter a name for the IdP.
- Identity Vendor: Select Okta from the drop-down menu.
- Domain: Select the domain for which the IdP is responsible for authenticating the users. This allows the Zscaler service to display the correct IdP to authenticate an incoming user.
- Protocol: Select SAML.
- Status: Select Enabled.
Login ID Attribute: Enter
NameID
to map it with the Login ID attribute.- If you are using
email
as the Login ID attribute, ensure that your email domain matches with one of the domains added to ZIdentity for thePrimary Email
attribute. - You can use any email domain for your primary email if you are using any attribute other than email as the source for the Login ID attribute.
- Ensure that the attributes you enter in the Login ID field match exactly with the attribute that would be received in the SAML assertions.
- If you are using
- Under the SAML Configuration section, copy the SP Entity ID.
- Under the General section:
Do not close the window as the SP Entity ID is going to be refreshed.
- 2. Configure app integration for ZIdentity in Okta.
- Log in to the Okta Admin Console.
- Go to Applications > Applications.
Click Create App Integration.
In the Create a new app integration window:
- Sign-in method: Select the SAML 2.0 option.
- Click Next.
The Create SAML Integration window appears.
- In the Create SAML Integration window:
Under the General Settings section:
- App name: Enter a name for the ZIdentity integration.
- Click Next.
Under the Configure SAML section:
- Enter the SP Entity ID value copied from ZIdentity Admin Portal in the previous step for both Single sign-on URL and Audience URI (SP Entity ID) fields.
- Attribute Statements: Enter a SAML attribute and an appropriate filter. This is used to pass any user attributes. For example, enter
Email
for the Name field and enter the appropriate variable name (e.g.,user.email
) from the Okta profile. - Group Attribute Statements: Enter a group name and an appropriate filter. This is used to pass group information. For example, enter
Groups
for the Name field and set Filter to Matches regex for.*
to retrieve group membership information of users. - Click Next.
Under the Feedback section:
- Select the This is an internal app that we have created option.
- Click Finish.
The SAML application page appears.
On the SAML application page, copy the Metadata URL from the Metadata details section.
- Go to the ZIdentity Admin Portal where the Add Primary Identity Provider (or Add Secondary Identity Provider) window that is already open.
Under the SAML Configuration section:
- Enter the Metadata URL copied from the Okta Admin Console in the previous step for the IdP Metadata URL field.
- Click Fetch.
- Click Save.
The SAML integration between Okta and ZIdentity is completed.
- 3. Provision users for ZIdentity using JIT or SCIM provisioning.
You can provision Okta users for ZIdentity using Just-in-time (JIT) provisioning or System for Cross-domain Identity Management (SCIM) provisioning.
- JIT provisioning
- In the ZIdentity Admin Portal, go to Integration > External Identities.
- Locate the IdP entry created for Okta under the Primary Identity Provider (or Secondary Identity Providers) tab and click the Edit icon.
In the Edit Primary IdP (or Edit Secondary IdP) window:
- Go to the Provisioning tab.
- Select Enable Just-in-time (JIT) Provisioning.
Map the ZIdentity user and group attributes with the appropriate Okta attributes as necessary. The mapping of the
Primary Email
attribute is mandatory as it is required for functionalities, such as password resetting and multi-factor authentication. By default, the following attributes in SAML assertions are mapped with the corresponding user attributes in ZIdentity.Attribute in SAML Assertions Default ZIdentity User Attributes firstName First Name lastName Last Name displayName Display Name - If the external IdP is configured to send different attributes for First Name, Last Name, or Display Name, then you must map those attributes. For example, if the SAML assertion from the external IdP includes
Surname
instead oflastName
, then you must map it with theLast Name
user attribute in ZIdentity. While mapping attributes, ensure that the attributes you enter in the Just-in-time Attribute field match exactly with the attributes that would be received in the SAML assertions.
- If the external IdP is configured to send different attributes for First Name, Last Name, or Display Name, then you must map those attributes. For example, if the SAML assertion from the external IdP includes
- Click Update.
- In the Okta Admin Console, go to Applications > Applications.
- Open the SAML application created for ZIdentity and go to the Assignments tab.
Add users and groups to the application using the Assign drop-down menu.
The JIT provisioning with Okta users is configured for ZIdentity.
- SCIM provisioning
- In the ZIdentity Admin Portal, go to Integration > External Identities.
- Locate the IdP entry created for Okta under the Primary Identity Provider (or Secondary Identity Providers) tab and click the Edit icon.
In the Edit Primary IdP (or Edit Secondary IdP) window:
- Go to the Provisioning tab.
- Select Enable SCIM Provisioning.
Copy the SCIM Endpoint URL. This value is used in a subsequent step.
The SCIM Endpoint URL field appears only if the configurations for the IdP in the Basic tab are completed and saved.
- Click Generate Token and copy the Bearer Token.
- (Optional) Map the SCIM attributes (e.g.,
addresses
) with the corresponding ZIdentity user attribute. This mapping is required only for attributes that need to be mapped to a custom user attribute in ZIdentity. To learn more about the SCIM attributes that require custom attribute mapping, see Understanding SCIM.
- In the Okta Admin Console, go to Applications > Applications.
- Open the SAML application created for ZIdentity and do the following:
On the General tab:
- Click Edit next to App Settings.
- Select Enable SCIM provisioning.
- Click Save.
- On the Provisioning tab:
- Click Edit for SCIM Connection.
- SCIM Connector Base URL: Enter the SCIM Endpoint URL copied from the ZIdentity Admin Portal.
- Unique identifier field for users: Enter
userName
as the value. - Supported provisioning actions: Select the Push New Users and Push Groups options.
- Authentication mode: Select HTTP Header from the drop-down menu.
Authorization: Enter the bearer token copied from the ZIdentity Admin Portal.
Click Test Connector Configuration and make sure that Create users and Push Groups options are shown with green checkmarks.
- Close the Test Connector Configuration window.
Click Save and ensure that the Create users option is enabled under the Provisioning tab.
- On the Assignments tab, click the Assign drop-down menu, and select an option to assign users or groups:
- Assign users
Select Assign to People.
Search and locate users you want to assign, and click Assign.
- Click Done.
- Assign groups
Select Assign to Groups.
Search and locate the groups you want to assign, and click Assign.
- Click Done.
- Assign users
To sync users between an Okta group and a ZIdentity group, go to the Push Groups tab, and select an option to push groups by name or rule:
- Push groups by name
Select the Find groups by name option from the Push Groups drop-down menu.
By default, the Push group memberships immediately option is selected to push groups immediately to ZIdentity. However, you can disable it if you do not want to push groups immediately.
Enter the name of the group that you want to push and select the group from the drop-down menu.
- Click Save or click Save & Add Another if you want to push multiple groups.
- Click Close.
On the Push Groups tab, click By name on the left-side navigation and verify that all of your groups have been added.
- Push groups by rule
Select the Find groups by rule option from the Push Groups drop-down menu.
- In the Push groups by rule window:
- Rule name: Enter a name for the rule.
- Group name: Select a match condition from the drop-down menu and enter a string that should be used to find a group with the name matching the condition. For example, you can select Contains as the match condition and enter
Admins
as the string to match all groups that has the string "Admin" and push them to ZIdentity. Group description: Select a match condition from the drop-down menu and enter a string that should be used to find a group with the description matching the condition. For example, you can select Contains as the match condition and enter
For Admins
as the string to match all groups that has the string "For Admins" in the description and push them to ZIdentity.By default, the Immediately push groups found by this rule option is selected to push groups immediately to ZIdentity. However, you can disable it if you do not want to push groups immediately.
- Click Create Rule.
On the Push Groups tab, select the rule name created in the previous step under the By rule option on the left-side navigation, and verify that all of your groups have been added.
To learn more about group push, refer to the Okta technical documentation.
- Push groups by name
The SCIM provisioning with Okta users is configured for ZIdentity.
Close
- JIT provisioning
IdP-Initiated SSO for ZIdentity Tenants Enabled with Experience Center
In Experience Center-enabled tenants, during the IdP-initiated SSO flow, the user is redirected to Experience Center by default. To change this and ensure the user is redirected to ZIdentity you must configure the
zidServiceId
attribute in Okta.- See steps to configure the attribute
- Log in to the Okta Admin Console.
- Go to Applications > Applications.
- Locate the application created for ZIdentity and open it.
Go to the General tab, locate the SAML Settings, and click Edit.
- In the Edit SAML Integration wizard, click Next in the General Settings tab.
- In the Configure SAML tab, locate the Attribute Statements (optional) section.
- Enter
zidServiceId
in the Name field. Enter
800000000103
in the Value field. This value is the same for all tenants.- Click Next.
In the Feedback tab, click Finish.