Configuring SCIM Connector Settings

To configure SCIM settings do the following:

  1. Open SCIM Connector.

    alt

  2. The home page displays.

  3. Enter the Secret Server URL, Username, and Password and click Sign in.

  4. Select Settings and enter the Secret Server application account details.

    alt

  5. Select Save to check the connection.

  6. Select SCIM Connector Endpoints.

  7. Select Add Endpoint and enter the details.

    alt

    Don't select Is api based integration. It should only be selected when a third-party application doesn't have a provision to add the SCIM token.

  8. Select Generate Token and Save.

Add the Source in SailPoint

  1. Go to the SailPoint URL and log in with Admin credentials.

    alt

  2. The SailPoint homepage opens.

    alt

  3. Select the Admin tab.

    alt

  4. Navigate to Connections > Sources and click New.

    alt

  5. The Create New Source dialog box opens.

    alt

  6. Select the Source Type as SCIM 2.0.

  7. Enter a Source Name.

  8. Enter a Description.

  9. In Source Owner enter the name of an owner.

  10. Under Connection Type, select Direct Connection.

  11. Select Continue.

  12. In the Virtual Appliance Cluster, select the virtual appliance cluster that will be used as the application connector for the source and click Save.

    For details refer to Getting Started in IdentityNow.

    alt

  13. Select the Connection Setting option.

  14. Enter the Delinea SCIM URL in the Host URL field and select API Token and enter the Non-expiring token option generated by the SCIM connector, and select Save.

    For details refer to SCIM Connector Endpoint Information.

    alt

  15. Select Review and Test and Test Connection.

    alt

  16. The Test Success! pop-up displays. Select Exit Configuration.

    alt

Configure IdentityNow for Provisioning

  1. Open the Source previously created.

    alt

  2. Go to Import Data > Test Connection.

    alt

  3. The Connected button highlights.

    alt

  4. Go to Account Schema.

    alt

  5. Select Discover Schema.

    alt

  6. It will take a few minutes for the available schemas to load. Once completed, the list will display.

    alt

  7. In the Account ID field select id and in the Account Name field select userName and click Save Schema.

    alt

Configure IdentityNow for Provisioning

  1. From the menu, go to Identities > Identity Profiles.

    alt

  2. Select +New to create a profile.

  3. In the Name field enter the name and select the Account Source. Click OK to save.

    alt

  4. Open the recently created Identity Profile.

    alt

  5. Select Mapping and select the proper Attribute against the Source.

    alt

  6. Once the Attributes are assigned, click Save and then Update. It will take a few minutes for the identity to update.

    alt

  7. Go to Source and select Account Aggregation.

    alt

  8. Select Start to sync the users from the Secret Server.

    alt

  9. Once Aggregation is complete, the status is displayed under the Aggregation Activity Log.

    alt

  10. Select Accounts to verify the Secret Server user.

    alt

  11. Users are also added to the Identity List. To verify, go to Identities > Identity List.

    alt

  12. A list of users added from the Secret Server will display.

    alt

  13. Permissions can be added to the selected user from the list.

    alt

  14. To verify the Groups from Secret Server, go to Import Data > Entitlement Aggregations.

  15. Select Start to begin the aggregation. The status will display in the Activity Log.

    alt

  16. Select Entitlements to verify that the groups are synced in SailPoint.
    alt