<iframe src="https://www.googletagmanager.com/ns.html?id=GTM-M74D8PB" height="0" width="0" style="display:none;visibility:hidden">
Loading
Skip to NavigationSkip to Main Content
Forcepoint SCIM Integration Guide
Okta Classic Engine
Okta Identity Engine
API Access Management
Overview

Configure the Forcepoint Private Access Okta app to provide user and group provisioning, and single sign-on authentication for Private Access end users.

This article demonstrates how to properly set up the SCIM integration between Okta and Forcepoint. 

Applies To
  • SCIM
  • Manage users
  • Forcepont
Solution

Before beginning

Make sure to have the following: 

  • An Okta org that has the SCIM Provisioning feature enabled. This feature is tied to the Lifecycle Management SKU. If it is not enabled, please reach out to the designated Okta Account Executive or to Okta Support in order to enable it.
  • A Forcepoint Private Access account with access to the management portal.

On the Forcepoint side

The Base URL and the Token from Forcepoint will be needed. In order to get these, please refer to steps 7) and 8) from this Forcepoint documentation.

 

On the Okta side

  • Log in to Okta and navigate to the Admin Dashboard. 
  • On the left side of the screen, go to Applications Applications Browse App Catalog and search for Forcepoint Private Access.

   

  • Click on Add Integration. For the Application label, put the desired name that the app should have in Okta, such as "Forcepoint Private Access". Then click Done.

  • Go to the Provisioning tab for the application and select Enable API Integration. Here, enter the Base URL and Token values from the Forcepoint side:

  • Click the Test API Credentials button to check that the connection to the Forcepoint SCIM service is successful.
    The following message should be seen: Forcepoint Private Access was verified successfully.
    When it was verified that the connection is working, click Save.
  • Now that the SCIM Application is successfully integrated, go to Provisioning > To App tab > click Edit, and enable the desired features.
  • On the Assignments tab of the application, click Assign and select either "Assign to People" or "Assign to Groups". Then search for the users/groups that should be assigned to the app, click Assign and Save and Go Back.

  • Lastly, in order to configure the SAML settings, go to the Sign On tab of the app, copy the Metadata URL (it will be needed later), and click View SAML Setup Instructions on the right-hand side. Follow the instructions in order to set up SAML.      

           

Recommended content

Loading
Forcepoint SCIM Integration Guide