scim: Add a /help/ page for Okta SCIM.

This commit is contained in:
Mateusz Mandera 2021-10-23 15:18:32 +02:00 committed by Tim Abbott
parent 3871c99104
commit 1c0e92d343
3 changed files with 57 additions and 2 deletions

View File

@ -131,6 +131,7 @@
* [Import from Rocket.Chat](/help/import-from-rocketchat) * [Import from Rocket.Chat](/help/import-from-rocketchat)
* [Configure authentication methods](/help/configure-authentication-methods) * [Configure authentication methods](/help/configure-authentication-methods)
* [SAML authentication](/help/saml-authentication) * [SAML authentication](/help/saml-authentication)
* [SCIM provisioning](/help/scim)
* [Export your organization](/help/export-your-organization) * [Export your organization](/help/export-your-organization)
* [Change organization URL](/help/change-organization-url) * [Change organization URL](/help/change-organization-url)
* [Deactivate your organization](/help/deactivate-your-organization) * [Deactivate your organization](/help/deactivate-your-organization)

View File

@ -4,7 +4,8 @@ Zulip supports using SAML authentication for single sign-on, both when
self-hosting or on the Zulip Cloud Plus plan. self-hosting or on the Zulip Cloud Plus plan.
This page documents details on how to set up SAML authentication with This page documents details on how to set up SAML authentication with
Zulip with various common SAML identity providers. Zulip with various common SAML identity providers. Once you have setup
SAML, you may also want to consider configuring [SCIM](/help/scim).
If you are self-hosting, this documentation is likely still useful for If you are self-hosting, this documentation is likely still useful for
how to configure these SAML providers to work with Zulip. how to configure these SAML providers to work with Zulip.
@ -154,6 +155,7 @@ following information to Zulip Support at support@zulip.com:
## Related articles ## Related articles
* [SAML configuration][saml-readthedocs] for self-hosting. * [SAML configuration for self-hosting][saml-readthedocs]
* [SCIM provisioning](/help/scim)
[saml-readthedocs]: https://zulip.readthedocs.io/en/stable/production/authentication-methods.html#saml [saml-readthedocs]: https://zulip.readthedocs.io/en/stable/production/authentication-methods.html#saml

View File

@ -0,0 +1,52 @@
# SCIM provisioning
SCIM (System for Cross-domain Identity Management) is an standard
protocol used by Single Sign-On (SSO) services and identity providers
to provision/deprovision user accounts and groups. Zulip's SCIM
integration is currently beta and has a few limitations:
* Provisioning Groups is not yet implemented.
* It has only been fully tested and documented with Okta.
The instructions below explain how to configure SCIM in Okta for Zulip
Cloud customers. Like SAML, feature is currently only available in
Zulip Cloud with the Zulip Cloud Plus plan.
These instructions can also be used by self-hosters to setup the Okta
side of SCIM for their deployment.
## Configure SCIM with Okta
1. Before you begin, contact [email support](mailto:support@zulip.com) to receive
the bearer token that Okta will use to authenticate to make its SCIM requests.
1. In your Okta Dashboard, go to `Applications` and choose `Browse App Catalog`.
1. Search for `SCIM` and select `SCIM 2.0 Test App (Header Auth)`.
1. Click `Add` and choose your `Application label`. For example, you can name it `Zulip SCIM`.
1. Continue to `Sign-On Options`. Leave the `SAML` options, as this type of Okta application
doesn't actually support `SAML` authentication, and you'll need to set up a separate Okta app
to activate `SAML` for your Zulip organization.
1. In `Credentials Details`, set `Application username format` to `Email` and
`Update application username on` to `Create and update`.
1. The Okta app has been added. Navigate to the `Provisioning` tab.
1. Click `Configure API Integration` and check the `Enable API integration` box.
Okta will ask you for the `Base URL` and `API token`. The `Base URL` should be
`yourorganization.zulipchat.com/scim/v2` and for `API token` you'll set the value
given to you by support. When you proceed to the next step, Okta will verify that
these details are correct by making a SCIM request to the Zulip server.
1. In the `To App` section of the `Provisioning` tab (which should be opened by default
when you continue from the previous step), edit the `Provisioning to App` settings
to enable `Create Users`, `Update User Attributes` and `Deactivate Users`.
1. In `Attribute Mappings`, remove all attributes except `userName`, `givenName`
and `familyName`.
1. Now the integration should be ready and you can `Assign` users to
the app to configure their Zulip accounts to be managed by
SCIM. When you assign a user, Okta will check if the account exists
in your Zulip organization and if it doesn't, the account will be
created. Changes to the user's email or name in Okta will
automatically cause the Zulip account to be updated accordingly.
Unassigning a user from the app will deactivate their Zulip
account.
If you want to also set up SAML authentication, head to our
[SAML configuration instructions](/help/saml-authentication). It will require
adding a separate Okta application.