Configure the Forcepoint Private Access Okta app to provide user and group provisioning, and single sign-on authentication for Private Access end users.
This article demonstrates how to properly set up the SCIM integration between Okta and Forcepoint.
- SCIM
- Manage users
- Forcepont
Before beginning
Make sure to have the following:
- An Okta org that has the SCIM Provisioning feature enabled. This feature is tied to the Lifecycle Management SKU. If it is not enabled, please reach out to the designated Okta Account Executive or to Okta Support in order to enable it.
- A Forcepoint Private Access account with access to the management portal.
On the Forcepoint side
The Base URL and the Token from Forcepoint will be needed. In order to get these, please refer to steps 7) and 8) from this Forcepoint documentation.
On the Okta side
- Log in to Okta and navigate to the Admin Dashboard.
- On the left side of the screen, go to Applications > Applications > Browse App Catalog and search for Forcepoint Private Access.
- Click on Add Integration. For the Application label, put the desired name that the app should have in Okta, such as "Forcepoint Private Access". Then click Done.
- Go to the Provisioning tab for the application and select Enable API Integration. Here, enter the Base URL and Token values from the Forcepoint side:
- Click the Test API Credentials button to check that the connection to the Forcepoint SCIM service is successful.
The following message should be seen: Forcepoint Private Access was verified successfully.
When it was verified that the connection is working, click Save. - Now that the SCIM Application is successfully integrated, go to Provisioning > To App tab > click Edit, and enable the desired features.
- On the Assignments tab of the application, click Assign and select either "Assign to People" or "Assign to Groups". Then search for the users/groups that should be assigned to the app, click Assign and Save and Go Back.
- Lastly, in order to configure the SAML settings, go to the Sign On tab of the app, copy the Metadata URL (it will be needed later), and click View SAML Setup Instructions on the right-hand side. Follow the instructions in order to set up SAML.
