SCIM provisioning with Okta
Configure Okta to push your organization's groups to Platform over SCIM 2.0. Once provisioning is enabled, your Okta group directory appears in Seqera's IdP group catalog and stays in sync with renames, additions, and deletions automatically.
Before you begin
- An Okta application configured as your SSO connection. To set up SSO, see Single sign-on (SSO).
- Organization owner access to your Platform organization.
- Administrator access to your Okta tenant.
Get the Seqera SCIM connection details
- In Seqera, open Organization settings and select Manage single sign-on, then Group mapping.
- Copy the SCIM endpoint URL: it has the form
https://<host>/orgs/<orgId>/scim/v2/Groups. - Select Generate token to issue a SCIM bearer token. Copy it immediately; you can't view it again after closing the dialog.
The bearer token grants write access to your group catalog. Store it in a secrets manager and rotate it on a schedule. To rotate, generate a new token in Platform and update Okta's configuration; the previous token is revoked when the new one is issued.
Enable provisioning in Okta
- Sign in to your Okta administrator console.
- Open Applications, then select the application that fronts your Seqera SSO connection.
- Open the Provisioning tab and select Configure API integration.
- Select Enable API integration and provide:
- Base URL: The SCIM endpoint URL from the previous section, with
/Groupsremoved (Okta appends the resource path). - API token: The bearer token from the previous section.
- Base URL: The SCIM endpoint URL from the previous section, with
- Select Test API Credentials. Okta should report a successful connection.
- Select Save.
Enable group push
- With the application still open, switch to the Push Groups tab.
- Select Push Groups, then Find groups by name (or By rule for dynamic group sets).
- Select the Okta groups you want available in Platform.
- Confirm the push. Okta sends an initial provisioning batch.
Verify in Platform
- Return to the Group mapping panel in Platform.
- Refresh the page. The pushed Okta groups should appear in the catalog list within a few seconds.
- Open any team's edit form. The IdP Group dropdown is now populated with the synced groups.
If groups don't appear, check the Push Groups status column in Okta for error details, and confirm that the Provisioning tab shows Push Groups: ON.
Group rename and delete behavior
Renames and deletes propagate automatically:
- Rename: The next SCIM push updates the catalog row's display name. Delegated teams that reference the group continue to work without interruption.
- Delete: Okta issues a SCIM
DELETEfor the group. Platform removes the catalog row and synchronously purges members from any delegated Team that referenced it. The affected teams remain in place with empty membership and an orphaned-team warning, so you can re-delegate them or revert to manual management.
Troubleshooting
Groups appear in Okta but not in Platform
Confirm the bearer token in Okta matches the latest token issued. If you generated a new token after configuring Okta, the previous one is revoked.
401 Unauthorized from Okta logs
The bearer token is invalid or expired. Generate a new token and replace it in Okta.
409 Conflict on a specific group
A group with the same display name already exists in another organization on the same instance. This applies to Seqera Platform Enterprise multi-organization deployments only. Cloud Pro organizations are scoped by org_id and aren't affected.