When configuring a System for Cross-domain Identity Management (SCIM) integration and clicking Test Connector Configuration, the following error message is displayed:
Error authenticating: Connect to <domain>:443 [<domain.com>/<IP Address>] failed: Connect timed out
- System for Cross-domain Identity Management (SCIM) 2.0 Integrations
- Provisioning
- Custom API Connectors
- Network Security / Firewalls
- Okta Classic Engine
- Okta Identity Engine (OIE)
A Connect timed out error specifically means that Okta’s servers were unable to establish a TCP handshake with the target server within the required time limit. This error is commonly caused by:
- Incorrect Base URL: The SCIM endpoint URL provided is incorrect or inaccessible from the public internet.
- Firewall Blocking: The target server or network gateway is dropping requests from Okta's IP addresses.
- Service Downtime: The SCIM implementation on the target server is not running or is unresponsive.
- Routing Issues: DNS resolution for the domain (for example,
<domain>.com) is pointing to an internal-only IP address that Okta cannot reach.
To resolve the timeout and successfully validate the SCIM configuration, follow these steps:
-
Verify External Reachability.
Test the SCIM endpoint from a network outside of the internal environment to ensure it is publicly accessible. Use the following curl command to verify if the endpoint responds
curl -X GET "https://<domain>.com/identities/scim/v2/Users" \
-H "Authorization: Bearer YOUR_ACCESS_TOKEN" \
-H "Accept: application/scim+json"
-
-
If this command also times out, the issue is with the server availability or a network-level block.
-
If this command returns a
200 OKor401 Unauthorized, the service is reachable. Proceed to Step 2.
-
-
Allowlist Okta IP Addresses.
Ensure that the firewall, Load Balancer, or Web Application Firewall (WAF) is configured to allow inbound traffic from Okta.
-
-
Navigate to Settings > Downloads in the Okta Admin Console to find the "Okta IP Address ranges" or refer to the Allow access to Okta IP addresses documentation.
-
Ensure port 443 is open for these ranges.
-
- Confirm SCIM Base URL.
In the Okta Provisioning tab under Integration, ensure the SCIM connector base URL does not include the /Users or /Groups suffix unless specifically required by the implementation. Usually, it should end at the base API level (for example, https://<domain>.com/identities/scim/v2).
-
Check for SSL/TLS Interception.
Ensure there is no proxy or SSL interceptor between Okta and the SCIM server that might drop the connection without a proper response.
