Documentation
Security & ComplianceOkta SSO and SCIM

Okta SSO and SCIM

Configure Okta OIDC SSO and SCIM provisioning for observity.ai.

Use this guide when Okta is your identity provider for observity.ai authentication and provisioning.

OIDC Application

  1. In Okta, create an OIDC - Web Application integration.
  2. Add the observity.ai Redirect URI from Settings > Single Sign-On (SSO) as a sign-in redirect URI before copying the Okta client credentials.
  3. Assign the users or groups that should access observity.ai.
  4. Copy the Okta issuer URL, client ID, and client secret into observity.ai.
  5. Save the observity.ai SSO configuration.

Use these OIDC scopes:

openid email profile

SCIM Provisioning

In Okta, enable provisioning for the observity.ai application and configure:

Okta Fieldobservity.ai Value
SCIM connector base URLobservity.ai SCIM Base URL
Unique identifier field for usersuserName
Supported provisioning actionsCreate users, update user attributes, deactivate users, push groups
Authentication modeHTTP Header
Authorization headerBearer {observity.ai SCIM token}

Attribute Mapping

Map these Okta user fields to SCIM attributes:

Okta ProfileSCIM Attribute
user.emailuserName
user.emailemails[primary eq true].value
user.firstNamename.givenName
user.lastNamename.familyName
user.displayNamedisplayName
Okta user ID or stable employee IDexternalId

Use a stable, non-recycled identifier for externalId. Email is acceptable only if your organization does not recycle email addresses.

Group Push

Use Okta group push for observity.ai roles:

  1. Push observity.ai access groups from Okta.
  2. Let the groups sync into observity.ai.
  3. In observity.ai, map each group to Viewer, Member, or Admin.
  4. Keep elevated roles owned by groups, not individual user overrides.

Recommended group pattern:

Okta Groupobservity.ai Role
observity.ai ViewersViewer
observity.ai MembersMember
observity.ai AdminsAdmin

After users and groups have synced, enable Require SCIM provisioning for SSO access in observity.ai.