2023-11
Use the following settings when creating the SCIM 2.0 application:
For Sign-on methods, leave SAML 2.0 checked.
For Credential Details:
Application username format: Select AD SAM Account name.
<aside> 💡 Please note that, as of now, the supported format for Application username is solely the AD SAM account name.
</aside>
<aside> 💡 Please note that we can only continue the following configuration in Section 1.2 and 1.3 until we have completed all configurations in section 3.
</aside>
In the Okta SCIM 2.0 application, under Provisioning, click Configure API integration.
Check the Enable API integration checkbox.
Enter the SCIM 2.0 Base Url and OAuth Bearer Token.
SDDC Manager calls the SCIM 2.0 Base Url the "Tenant URL," and the OAuth Bearer Token the "Secret Token."
Because my vCenter is an internal system, I uses an Internet accessible HAProxy as reverse proxy to forward the SCIM user provisioning requests from Okta to vCenter. The HAProxy’s domain name is haproxy01.davidwzhang.cloud
so I have changed the original base URL to the following.
<https://haproxy01.davidwzhang.cloud/usergroup/t/CUSTOMER/scim/v2>