Integrate with custom apps (SCIM)
Limited Early Access release
You can integrate Identity Security Posture Management (ISPM) with provisioning-enabled (SCIM) custom apps created in Okta. This extends your visibility into a wide range of custom or legacy SCIM apps that aren't available in the Okta Integration Network (OIN) catalog and allows you to continuously discover and analyze data from these apps.
Before you begin
To successfully integrate an OIN or custom app with ISPM, ensure that the following conditions are met:
-
You're subscribed to Okta Lifecycle Management.
-
The app instance that you want to connect with ISPM must be integrated in your Okta org. Otherwise, integrate it. See App integrations.
-
Ensure that the Okta org that hosts the app instance is connected to ISPM. Otherwise, connect the Okta org to ISPM. See Okta integration.
-
On the app's profile page in the Admin Console, go to the Provisioning tab and perform the following steps:
-
Check that Provisioning is enabled and configured.
-
Go to the Integration section and select the Import New Users and Profile Updates and Import Groups checkboxes for Supported provisioning actions.
See Configure provisioning for an app integration (Identity Engine) or Configure provisioning for an app integration (Classic Engine).
-
Start this task
-
In the ISPM console, go to the Sources Gallery.
-
Select the Custom apps category filter to view your custom apps.
If you have correctly configured SCIM and provisioning actions for your custom app in Okta, ISPM automatically detects and displays it here. You don't need to perform a status check for correctly configured custom apps.
-
Select the custom app that you want to integrate.
-
Select the Okta org that hosts the app.
-
If multiple instances of the app exist, select one or more instances that you want to connect.
-
Click Submit. The app is added to your connected sources, and the app status changes to Connected.
