Okta
Who this is for
Admins connecting Okta as a primary identity source.
Goal
Ingest Okta users, groups, and entitlements into Owlie.
Prereqs
- Okta admin access
- /implement/setup/first-connector
Success criteria
Okta users and groups appear in the Admin Dashboard after sync.
Steps
- Go to /admin/integrations/okta.
- Enter your Okta domain.
- Create and paste an Okta API token.
- Test the connection.
- Run the initial sync.
Default configuration
- Sync users and groups first before app entitlements.
When to change it
- Add app entitlements only after identity correlation is stable.
Impact and risks
- Over‑scoped tokens can expose more data than needed.
Example
Sync Okta users and groups, then build a “GitHub Read Access” resource from Okta group membership.
Troubleshooting
- If you see 401 errors, regenerate the Okta API token and retry.
Assumptions & Questions
- What exact scopes and field labels are required for the Okta token?
Next steps
- /implement/requests/access-requests
- /troubleshooting/connector-failures