Okta SCIM Setup
Configure automatic user and group provisioning from Okta to SecureCodingHub using SCIM 2.0.
Prerequisites
- Okta admin account
- SecureCodingHub org admin account
- SSO configured (recommended but not required)
Step 1 — Generate a SCIM Token
Log in to SecureCodingHub as Org Admin
Go to Settings → SCIM
Click Generate Token
Copy the token — it is shown only once
Step 2 — Configure SCIM in Okta
Go to Okta Admin → Applications → your SecureCodingHub app
Go to Provisioning tab → Configure API Integration
Check Enable API integration
SCIM connector base URL: https://api.securecodinghub.com/api/sch/scim/v2
Unique identifier field: email
API Token: paste your SCIM token
Click Test API Credentials — should show "Verified"
Save
Step 3 — Enable Provisioning Features
Enable the following provisioning features in Okta for full lifecycle management:
| Feature | Recommended |
|---|---|
| Create Users | Enable |
| Update User Attributes | Enable |
| Deactivate Users | Enable |
| Push Groups | Enable — syncs teams |
Step 4 — Test Provisioning
Assign a test user to the app in Okta
Check SecureCodingHub Users page — user should appear
Update the user's name in Okta → verify it updates in SecureCodingHub
Remove user from app in Okta → verify user is deactivated
SCIM Settings in SecureCodingHub
Here is what the SCIM configuration panel looks like in the admin settings: