...
When an Identity Provider (IDP) creates unique IDs for users, deleting and recreating a user in the IDP results in a new unique ID for that user. If you add the recreated user back into Avigilon Alta, the system will recognize them as a new user due to the new ID, even though the email address is the same. This can cause confusionconfuse, as it becomes unclear which version of the user is correct.
...
Info |
---|
Note:
* Note: Users are not removed from the Avigilon Alta application; they are only deactivated. |
Info |
---|
Note: If you are using Groups in Okta to manage your users please read this doc as Okta prescribes a certain way to handle this scenario. |
Prerequisites
To use this application, your account must meet the following requirements:
Have these Avigilon Alta licenses:
Premium or Enterprise
Okta Advanced
Admin access to your Okta organization is required to configure SCIM.
Supported features
The SCIM service supports the following capabilities:
Create Users: Users assigned to the Avigilon Alta application in Okta are eligible for synchronization with Avigilon Alta.
Update User Attributes: Changes made to user attributes in Okta are propagated to the Avigilon Alta application.
Group Push: Groups and their members in Okta can be pushed directly to the Avigilon Alta application.
Okta Advanced app set up and configure
Go to Sign in to your account:
and sign in. To accessfor the standard Alta Access portal.
For the European Alta Access portal,
Go Navigate to App marketplace Marketplace > Get appsApps.
Click the Okta Advanced tile.
- Click the
Select + Get
appApp Organization
button.
Go to App marketplace Marketplace > My appsApps.
Click the pencil icon to edit the Okta Advanced app.
In Under Sync typeType, select SCIM.
Click the Generate auth token button and Generate Auth Token, copy the token. Click , and click Done.
Note: You will
use this token
during SCIM setup
in Okta
(Step 9).
After setting up SCIM in Okta, manually :
Manually trigger the first sync in the Okta portal
.
Refresh the Access Groups or Roles page in Alta Access.
Enable any of the following settings , as needed:
Auto-create mobile credential
: Automatically creates a mobile credential for every user.
Auto-create cloud key credential
: Automatically create a cloud key credential for every user.
Sync mobile phone numbers
: Syncs
useuser phone numbers in E.164 format
(maximum
15 digits
, e.g., +[country code][subscriber number
including area code]).
Enable single sign-on (SSO) for
portal access
: Allows Okta super
admins to log in to
Avigilon Alta Access
using Okta credentials.
Enable single sign-on (SSO) for mobile app
: Enables users to log in to the Openpath app using Okta
credentials.
If you have not haven’t created any Avigilon Alta access groups yet, please first create them in go to Users > Access groupsGroups and create them.
Use the Create access group mapping Access Group Mapping button to map your Okta groups to your Avigilon Alta Access groups.
Iframe | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
SCIM advanced mapping (optional)
Info |
---|
Tip: Consider using the http://control.openpath.com/loginSSO or http://control.eu.openpath.com/loginSSO setup page to prevent users from trying a standard login. |
...
Follow these steps to set up the SCIM integration
...
In the left-hand menu, select Applications and then click Applications item.
...
Click Create App Integration, choose SAML 2.0, then click Next to complete the SAML setup workflow.
...
Go to the General tab, then select SCIM under Provisioning.
...
:
Go to Okta > Applications
Browse App Catalog
Search for and select Avigilon Alta
Add integration
Navigate to the Provisioning tab
Select Configure API Integration
Enable the checkbox labeled Enable API integration
Enter the following SCIM Connection settings:
SCIM connector base URL: Enter
your organization's base URL
The US region is https://api.openpath.com/scim/v2/okta/{orgId}
The EU region is https://
In the Authorization section, paste the token from Alta Access.
Checkbox Import Groups must be unchecked as it is not supported.
Test the connection configuration and click Save.
Switch back Return to your Okta Advanced app , continuing at and continue from step #7 above.
SCIM advanced mapping
...
Use the JSON editor to create rules for HTTPS requests that map users from the identity provider to a role or a specific group or all groups in Alta Access.
Iframe | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
...