Skip to main content

Okta

Who this is for

Admins connecting Okta as a primary identity source.

Goal

Ingest Okta users, groups, and entitlements into Owlie.

Prereqs

  • Okta admin access
  • /implement/setup/first-connector

Success criteria

Okta users and groups appear in the Admin Dashboard after sync.

Steps

  1. Go to /admin/integrations/okta.
  2. Enter your Okta domain.
  3. Create and paste an Okta API token.
  4. Test the connection.
  5. Run the initial sync.

Default configuration

  • Sync users and groups first before app entitlements.

When to change it

  • Add app entitlements only after identity correlation is stable.

Impact and risks

  • Over‑scoped tokens can expose more data than needed.

Example

Sync Okta users and groups, then build a “GitHub Read Access” resource from Okta group membership.

Troubleshooting

  • If you see 401 errors, regenerate the Okta API token and retry.

Assumptions & Questions

  • What exact scopes and field labels are required for the Okta token?

Next steps

  • /implement/requests/access-requests
  • /troubleshooting/connector-failures