This guide provides the steps required to configure provisioning for HackerOne.com.
Features
Push New Users
New users created through OKTA will also be created in the third-party application.
Push Profile Updates
Okta will push all user profile updates to the third-party application.
Push User Deactivation
Deactivating the user or disabling the user's access to the application through OKTA will deactivate the user in the third-party application.
Note: In this application, deactivating a user involves revoking login access while retaining the user's HackerOne information as inactive.
Reactivate Users
You can reactivate user accounts in the application.
Push Groups
OKTA can also push newly created groups to the third-party application.
Setup
Open OKTA and navigate to your Applications
Follow the steps here to set up your SAML integration.
Note: If you’ve set up your SAML integration before using the HackerOne application, SCIM will not be available.
You can follow the steps as described here and skip steps 6 and 10 - 13. Use this new application to set up SCIM provisioning.
Open your HackerOne SCIM application created above.
In the General tab click Edit behind App Settings.
Check the Enable provisioning features box
Click Save
Click the Provisioning tab.
Click Edit.
Set the Authentication Mode to HTTP HeaderPaste the URL from the SCIM credentials page into the SCIM connector base URL box.
Enter your email in the Unique identifier field for users box.
Enter the API Token you stored above behind Authorization.
Select the provisioning actions you want to use
Click Test Connector Configuration; if successful, a verification message appears at the top of the screen.
Click Save.
Select To App in the left panel, then select the Provisioning Features you want to enable.
Click Save.
You can now assign people to the app (if needed) and finish the application setup.
Troubleshooting Tips
Initial activation of Okta provisioning in HackerOne requires contacting your CSM. Please reach out with any questions during your configuration process.
Note: When Okta deactivates users, HackerOne removes them from your organization. Users lose login access but their data remains as 'inactive users.' Contact your CSM to permanently delete user data.