Skip to main content


Eptura Knowledge Center

About SCIM provisioning for Okta

Introduction to Okta Automated Provisioning with SCIM

Using Okta as your identity provider enables efficient provisioning and management of your organization’s users in Condeco. The Condeco SCIM integration allows Okta to serve as a single identity manager for adding and removing users, and for provisioning user groups.

Our SCIM integration supports SCIM version 2.0.

See also

About this guide

The SCIM provisioning for Okta guide is written for administrators and assumes familiarity with Okta; basic identity management concepts; and the SCIM standard.

The key steps are provided, however, this is not a comprehensive guide. For utilizing the full potential of SCIM, please refer to the SCIM 2.0 protocol specification


The following is required to set up the Condeco SCIM application in Okta.

  • Admin permissions to your Okta organization’s account.
  • Condeco SCIM API URL e.g. https://<CONDECO-SCIM-Domain>/scim/api/V1/
  • Long-lived SCIM token generated from SCIM Token Provider (up to 10 years).

Learn how to generate a SCIM token

Supported actions

When the SCIM integration between Okta and Condeco is ready, the following actions performed from Okta are also be applied to the users in Condeco.

Action in Okta Notes
Create users Condeco requires a unique username for each user. If the username already exists in Condeco, the SCIM User creation is rejected by our SCIM API.
Delete users  
Update user attributes Any update attributes applied to users in Okta are automatically updated on the corresponding Condeco user account.
Deactivate Users Deactivating a user or disabling a user’s access to Condeco through Okta, deactivates the user in Condeco.
Push Group Push group automatically creates a corresponding group in Condeco. Any group members (who exist in Condeco) are automatically mapped to the Condeco group (if ‘Push group memberships immediately’ option is ticked.