Okta SSO Provisioning Setup Guide

Note: If you are using non-Okta SSO to login to Productiv, please refer to this page for SCIM provisioning setup instead.

Enable provisioning on the Productiv app in Okta so that you can provision users directly to Productiv from Okta.

Supported Features

The Okta/Productiv Provisioning integration currently supports the following features:

  • Create Users
  • Update User Attributes
  • Deactivate Users
  • Import Users

For more information, visit our Help Center.

Step 1: Setup login with Okta

To set up SSO login with Okta, please complete the steps mentioned in the Okta SSO Setup Guide

Step 2: Generate API token in Productiv

Sign on to your Productiv instance.

Go to Settings > Organization.

Scroll to the SCIM Integration section under Set up Single Sign-On (SSO) Access section and click on Generate new token.

Copy the newly generated token to be used in subsequent steps.

Step 3: Enable provisioning from Okta

Login to your Okta admin portal and navigate to the Productiv app setup for SAML.

Click on the Provisioning tab and then on Integration tab.

Click Configure API Integration and fill in the following information,

API Token

<API Token Copied from Step 2> 

Import Groups

Unchecked 

Click on Test API Credentials and then Save once it completes successfully.

Step 4: Update provisioning settings

While staying on the Provisioning tab and then on To App tab.

Enable the following settings for provision users in Productiv from Okta.

  • Create Users
  • Update User Attributes
  • Deactivate Users

Your Productiv account should now be setup for provisioning via Okta. When a user is assigned or unassigned to the Productiv app in Okta, they will automatically get provisioned or disabled in Productiv.

Step 5: Add permissions management

While staying on the Provisioning tab and on the To App tab.

Scroll down and click on Go to Profile Editor.

Click on Add Attribute and fill in the following fields:

Data type

string 

Display name

Productiv permission role 

Variable name

permissionsRole 

External name

permissionsRole 

External namespace

urn:ietf:params:scim:schemas:core:2.0:User 

Attribute required

unchecked 

Attribute type

Group 

Now when assigning Productiv to an Okta group, you will be prompted to enter a string into the Productiv permissions field.

We currently support the management of the following roles on Okta:

Role in Productiv String to enter into permissions field
Super Admin   super-admin  
Application Admin   admin  
Basic User   basic-user  
Limited Plus User   limited-plus-user  
Limited User   limited-user  
Appstore User   appstore-user  
Custom role   <Custom role ID>  

Any users provisioned to Productiv by those groups will inherit its permissions. Custom roles are used to control user permissions for app restricted roles. The custom roles and their corresponding IDs can be found in this table in Productiv:

Click on Manage custom roles on the user settings page.

If a custom role ID is inputted into the permissions field, all of the corresponding users will be given that custom role's permission level and restricted apps list.

Troubleshooting

Please contact Productiv support for any issues with setting up Okta SSO Provisioning.

Users that are individually provisioned, or provisioned before the addition of the custom attribute must be converted to group assignments

References

Did this answer your question? Thanks for the feedback There was a problem submitting your feedback. Please try again later.

Still need help? Contact Us Contact Us