mirror of
https://github.com/open-metadata/OpenMetadata.git
synced 2025-07-08 17:50:28 +00:00
6.2 KiB
6.2 KiB
Collate SCIM Provisioning Guide
Prerequisites
For a user to log in using SSO, you must configure SSO from your identity provider to Collate.
Important Notes
- Default Provisioning Schedule:
- Azure provisioning happens once every 40 minutes by default
- Okta provisioning can be configured for real-time or scheduled intervals
- Group Provisioning Behavior in OpenMetadata:
- New Group: If your identity provider sends a group that doesn't yet exist in Collate, we'll create it at the root (under the Organization) with team type as "group"
- Existing Group: If the group already exists—no matter where it sits in Collate's hierarchy—we'll simply add or remove the user in that group
- Requirement: For provisioning to happen, you must assign users/groups to the SCIM App in your identity provider dashboard
Step 1: Configure Collate
Note
: As of now, we will enable SCIM from the backend for the customer. In future releases, we will bring out the option to enable/disable from the UI.
To get the secret token:
- Navigate to Settings → Bot → SCIM-Bot
- Copy the bot token
Step 2A: Configure Microsoft Entra ID (Azure)
2A.1 Create Enterprise Application
- In your Azure portal, go to Microsoft Entra ID → Enterprise Applications
- Click + New Application above the application list
- Click on Create your own Application
- Enter a Name for the application and click Create
2A.2 Configure Provisioning
- Under the Manage menu, click Provisioning
- Set Provisioning Mode to Automatic
- Set the SCIM API endpoint URL (will be provided by Collate)
- Set Secret Token to the Collate SCIM token that you generated in Step 1
- Click Test Connection and wait for the confirmation message that the credentials are authorized to enable provisioning
- Click Save
2A.3 Assign Users and Groups
- In the application page, click on Users and Groups
- Click Add user/group
- Select the desired user/group
- Click Assign
- Navigate to Overview → Start Provisioning to begin the provisioning process
Step 2B: Configure Okta
2B.1 Create SCIM Application
- In your Okta Admin Console, go to Applications → Applications
- Click Create App Integration
- Select SAML 2.0 or OIDC for SSO (if not already configured)
- For SCIM provisioning, go to the Provisioning tab in your existing application
2B.2 Configure SCIM Settings
- In the application, click on the Provisioning tab
- Click Configure API Integration
- Check Enable API integration
- Set the Base URL to the SCIM API endpoint URL (will be provided by Collate)
- Set the API Token to the Collate SCIM token from Step 1
- Click Test API Credentials to verify the connection
- Click Save
2B.3 Configure Provisioning Settings
- Go to Provisioning → To App
- Click Edit and enable the following:
- Create Users: Enable to create users in Collate
- Update User Attributes: Enable to sync user attribute changes
- Deactivate Users: Enable to deactivate users when removed from Okta
- Configure attribute mappings:
- userName → userName
- email → email
- firstName → firstName
- lastName → lastName
- displayName → displayName
- Click Save
2B.4 Assign Users and Groups
- Go to the Assignments tab
- Click Assign → Assign to People or Assign to Groups
- Select the users or groups you want to provision
- Click Assign and then Save and Go Back
- Click Done
2B.5 Configure Group Provisioning
- In the Provisioning tab, go to To App
- Scroll down to Group Push section
- Configure group provisioning options:
- Push Groups: Click Push Groups → Find groups by name or Push groups by name/rule
- Create Groups: Enable to automatically create groups in Collate
- Update Group Attributes: Enable to sync group changes
- For automatic provisioning, set up Push groups by name/rule:
- Define rules like groups starting with "OM_" or "Collate_"
- Groups matching these rules will be automatically provisioned
- Click Save
Note
: Once configured, groups will be automatically provisioned when they match your rules or when manually pushed. You don't need to click "Push Groups" repeatedly for automatic provisioning.
2B.6 Start Provisioning
- Go to Provisioning → To App
- The provisioning will start automatically once users/groups are assigned
- You can monitor the status in the Provisioning dashboard
Managing Provisioning
Microsoft Entra ID (Azure)
- Stop Provisioning: Click on "Pause Provisioning"
- Test Provisioning: Use "Provision on demand"
- View Logs: Access provisioning logs from the provisioning section
Okta
- Stop Provisioning: Disable API integration in the Provisioning tab
- Test Provisioning: Use "Test API Credentials" or check individual user provisioning status
- View Logs: Go to Reports → System Log and filter by the application name
Troubleshooting
Common Issues for Both Providers
-
Connection Issues:
- Verify the SCIM endpoint URL is correct
- Ensure the secret token is valid and properly configured
- Check network connectivity and firewall settings
-
User/Group Assignment Issues:
- Confirm users/groups are properly assigned to the application
- Verify user attributes are mapped correctly
- Check for duplicate users or conflicting email addresses
-
Provisioning Failures:
- Review provisioning logs for specific error messages
- Ensure required user attributes are populated
- Verify user permissions in Collate
Microsoft Entra ID Specific
- Check the provisioning logs for error messages
- Verify the application is properly configured in Enterprise Applications
Okta Specific
- Check the System Log for SCIM-related errors
- Verify API integration is enabled and credentials are correct
- Ensure attribute mappings are configured properly
- Check if users are in the correct state (ACTIVE) in Okta