Who can use this feature?
- Requires an Enterprise or Data Direct plan.
- Requires an admin role to configure.
Data Direct functionality will soon become a part of Fullstory Anywhere. To learn more about upcoming changes to Fullstory's product offerings, please visit this page.
This article provides guidance for configuring System for Cross-domain Identity Management (SCIM) for your Fullstory account. SCIM, when used in conjunction with Single Sign-On (SSO), allows you to automate the provisioning and deprovisioning of user accounts in Fullstory directly from your Identity Provider (IdP). This streamlines user management and enhances security.
Enabling SCIM in Fullstory
Admin users can configure SCIM in Fullstory.
- Within Fullstory, go to Settings > Account Management > SSO.
- Under Account Provisioning, select SCIM Provisioning from the dropdown menu.
Note: If you don't see Account Provisioning, ensure that SAML SSO is already configured for your Fullstory organization. See How do I configure SSO? for more information. - Fullstory will display information that you will need to enter into your IdP later, including the following:
- SCIM connector base URL
- Unique identifier for users
- Authentication mode
- Authorization token
- Click Generate Authorization Token. Keep this information secure as it will be used to authorize the connection from your IdP.
Setting up the SCIM connection in Okta
The following steps provide an example of how to configure SCIM with Okta. The specific steps may vary depending on your IdP.
- From your Okta Admin console, navigate to Applications > Applications.
- Select the Okta Application that you have configured for Fullstory SSO.
- For the selected Okta Application, click on the General tab and then click Edit.
- Under Provisioning, select SCIM and click Save. This will add a Provisioning tab to your Fullstory Okta application.
- Click on the new Provisioning tab.
- Under Integration, click Edit.
- Using the information obtained from Fullstory in the previous section, fill out the following details:
- SCIM connector base URL
- Unique identifier field for users
- Supported provisioning actions
- Authentication Mode
- Authorization token
- Click Test Connector Configuration.
- If the test is successful, click Save.
Mapping User Roles via SCIM Attributes (Recommended)
To automatically assign Fullstory roles to users based on their group memberships in Okta, follow these steps:
- In Okta, navigate to Directory > Profile Editor.
- Select your Fullstory Okta Application and click + Add Attribute.
- Fill out the attribute details with the following information:
Attribute Information | Value |
Data Type | String |
Display Name | Fullstory Role |
Variable Name | fullstoryRole |
External Namespace | urn:ietf:params:scim:schemas:core:2.0:User |
Define enumerated list of values | Checked |
- Add the following Attribute Members with their corresponding Value:
Display Name | Value |
Admin | admin |
Architect | architect |
Standard | standard |
Explorer | explorer |
Guest | guest |
- Ensure Attribute Type is set to Group.
- Click Save.
- In Okta, navigate back to your Fullstory Okta application and click on the Assignments tab.
- Add the groups you want to map to Fullstory roles.
- Click the pencil icon to open the Edit Group Assignment screen, you should now see the Fullstory Role attribute.
- Select the desired Fullstory role from the dropdown that you want to assign to members of this Okta group.
- Click Save and repeat this for all relevant Okta groups.
Enabling SCIM Functionality in the Fullstory Okta App
- From the Okta Application, navigate to Provisioning > To App and click Edit.
- Select the provisioning features you want Okta to manage. It is recommended to enable Create Users, Update User Attributes, and Deactivate Users.
- Click Save.
Converting Existing Users to SCIM Users (If Applicable)
If you already have users assigned to the Fullstory Okta application before configuring SCIM, you may need to manually provision them via SCIM:
- In the Okta Application, navigate to the Assignments tab.
- Click Provision User and follow the prompts to ensure existing users are managed through SCIM. You will only need to do this if you had users assigned before enabling SCIM.
By following these steps, you can successfully configure SCIM for your Fullstory organization, enabling automated user provisioning and deprovisioning through your Identity Provider. This will streamline your user management processes and enhance the security of your Fullstory account. Remember to consult the documentation for your specific Identity Provider for any variations in the configuration steps.