This guide walks you through configuring SCIM 2.0 provisioning between Okta and BetaTesting. SCIM enables automatic user creation, updates, deactivation, and group synchronization from Okta to BetaTesting.
Prerequisites
Before setting up SCIM, you must have:
A SAML-based SSO connection already configured between Okta and BetaTesting (see Set Up SSO with Okta)
Administrator access to your Okta admin console
The following values from your BetaTesting account manager:
SCIM base URL (e.g.,
https://betatesting.com/api/scim/v2)SCIM Bearer token for authenticating API requests
Important: SCIM provisioning in Okta requires a SAML app integration (not OIDC). If you originally set up an OIDC-based integration, contact your BetaTesting account manager to migrate to a SAML-based connection.
Step 1: Enable SCIM Provisioning on Your Okta App
Go to your BetaTesting SAML app in the Okta admin console
Go to the General tab > App Settings > Edit
Under Provisioning, select SCIM
Click Save
A new Provisioning tab will appear on your app.
Step 2: Configure the SCIM Connection
Go to the Provisioning tab
Click Edit under SCIM Connection
Configure the following:
Setting | Value |
SCIM connector base URL | The SCIM base URL provided by BetaTesting (e.g., |
Unique identifier field for users |
|
Supported provisioning actions | Check all that apply: Push New Users, Push Profile Updates, Push Groups |
Authentication Mode | HTTP Header |
Authorization | Paste the Bearer token provided by BetaTesting |
Click Test Connector Configuration to verify the connection
Okta will call BetaTesting's
/ServiceProviderConfigendpointIf the test succeeds, you'll see a success message
Click Save
Step 3: Enable Provisioning Actions
Under Provisioning > To App, click Edit
Enable the following:
Create Users - Automatically create BetaTesting accounts when users are assigned in Okta
Update User Attributes - Sync profile changes from Okta to BetaTesting
Deactivate Users - Deactivate BetaTesting accounts when users are unassigned in Okta
Click Save
Step 4: Push Groups
Groups pushed from Okta to BetaTesting are used for automatic role assignment. See SSO Role Mapping & Permissions for details on how groups map to roles.
In your BetaTesting app, go to the Push Groups tab
Click Push Groups > Find groups by name
Search for and select the groups you want to push to BetaTesting (e.g., "Admins", "Support", "Testers")
For each group, verify that Push group memberships immediately is checked
Click Save
Okta will now:
Create each selected group in BetaTesting via the SCIM Groups endpoint
Sync group memberships as users are added or removed
Tell your BetaTesting account manager which groups you're pushing and what BetaTesting role each group should map to. They will configure role mappings on the BetaTesting side.
Step 5: Assign Users
In your BetaTesting app, go to the Assignments tab
Click Assign > Assign to People (or Assign to Groups)
Select the users or groups who should have BetaTesting access
Click Assign
For each assigned user, Okta will:
Call BetaTesting's SCIM API to create a user account
Add the user to any pushed groups they belong to
BetaTesting will automatically assign the appropriate role based on group membership
Step 6: Test SCIM Provisioning
After assigning users and pushing groups, verify with your BetaTesting account manager that:
User accounts were created - Assigned users should have BetaTesting accounts
Groups were synced - Pushed groups should appear in BetaTesting with correct memberships
Roles are assigned correctly - Users in mapped groups should have the expected BetaTesting role
Test SSO Login
Open the SSO login link provided by your BetaTesting account manager
Log in with a user who was provisioned via SCIM
Verify:
The user can log in successfully
The user has the correct role based on their group membership
The user lands on the appropriate BetaTesting page
Test Deprovisioning
In Okta, unassign a test user from the BetaTesting app
Wait for Okta to send the deactivation request (this happens automatically)
Attempt to log in via SSO with the deprovisioned user
Verify: the user sees an error message and cannot access BetaTesting
What BetaTesting Configures
During SCIM setup, the BetaTesting team:
Enables SCIM on your SSO connection and generates a secure Bearer token
Provides you with the SCIM base URL and token for your Okta configuration
Configures role mappings that link your pushed Okta group names to BetaTesting roles (e.g., "Admins" -> Company Admin, "Support" -> Support role)
Verifies provisioning by checking that users, groups, and memberships are synced correctly
Next Steps
Configure role mappings: Work with your BetaTesting account manager to map Okta groups to BetaTesting roles. See SSO Role Mapping & Permissions
Troubleshooting: If you encounter issues, see SSO/SCIM FAQ & Troubleshooting
