Skip to content

OneLogin Directory

This guide helps administrators sync their OneLogin directory with an application they want to onboard. Integrating your application with OneLogin automates user management tasks and keeps access rights up-to-date.

Setting up the integration involves:

  1. Endpoint: The URL where OneLogin sends requests to your application, enabling communication between them.
  2. Bearer Token: A token OneLogin uses to authenticate its requests to the endpoint, ensuring security and authorization.

By setting up these components, you enable seamless synchronization between your application and the OneLogin directory.

  1. Open the Admin Portal from the app being onboarded and select the “Directory Sync” tab. Choose “OneLogin” as your Directory Provider.

    Setting up Directory Sync in the admin portal of an app being onboarded: OneLogin selected as the provider, awaiting configuration

    Click “Configure” to generate an Endpoint URL and Bearer token for your organization.

    OneLogin directory sync setup: Endpoint URL and one-time visible bearer token provided

  2. In OneLogin, click “Administration” and then “Applications” from the top navigation pane.

    OneLogin Administration Applications

    Click “Add App” to add a new application.

    The OneLogin Applications page displays a list of apps with options to download JSON or add a new app.

    Search for “SCIM Provisioner with SAML (SCIM v2 Enterprise)”

    OneLogin application search results for "SCIM Provisioner with SAML" displaying SCIM v2 Enterprise option.

    Name the app (e.g., “Hero SaaS App”) and click “Save”.

    Configuring the portal settings for the application in OneLogin, including display name and icon options.

    Go to the “Provisioning” tab, enable provisioning, and click “Save”.

    Setting up provisioning workflow for SCIM Provisioner with SAML in OneLogin, including options for user creation, deletion, and suspension actions.

  3. Go to “Users” and click on a user you want to provision.

    OneLogin Users dashboard displaying user information, including roles, last login time, and account status.

    Go to the “Applications” tab, click ”+”, and assign “Hero SaaS App”. Click “Continue”.

    Assigning a new login to a user in OneLogin

    Click “Pending” to approve provisioning.

    OneLogin user provisioning dialog for creating Kitty Flake in Hero SaaS App, with options to approve or skip the action.

    The status should change to “Provisioned” within a few seconds.

    OneLogin user profile for Kitty Flake displaying assigned applications, with Hero SaaS App provisioned and admin-configured.

    This action informs the Hero SaaS app that the user is approved for access, and the app can create an account for them. You can see the new user added to the “Hero SaaS App” in the portal.

    OneLogin Directory Sync interface showing user details for Kitty Flake in Your organization, with SCIM integration status.

  4. Applications being onboarded may have roles that scope access, such as “admin” roles allowing users to perform administrator actions like deleting logs. You can choose which users in your organization get administrator access while others get member access.

    To map users to groups in the app being onboarded:

    1. Create a role in OneLogin.
    2. Enable the inclusion of the Group parameter.
    3. Create a rule that automatically picks up a user’s role value and sets it to the Group parameter.
    4. Assign the role to the user.
    5. Assign the user to the app.
  5. Configure provisioning settings for groups

    Section titled “Configure provisioning settings for groups”

    Navigate to the list of Applications and select “Hero SaaS App”. Ensure the provisioning workflow is enabled in the “Provisioning” tab.

    Setting up provisioning workflow for SCIM Provisioner with SAML in OneLogin, including options for user creation, deletion, and suspension actions.

    Switch to “Rules” Tab and Click “Add Rule” button.

    Name the rule (e.g., “Assign Group in Hero SaaS”) and set the action to “Set Groups in Hero SaaS App” for each “role” with any value.

    Configuring a new mapping for group assignment in the Hero SaaS App using OneLogin.

    Select the “Parameters” tab, click on the “Groups” row, and check “Include in User Provisioning” in the popup.

    Configuring field groups in OneLogin for SCIM Provisioning, including SAML assertion and user provisioning options.

  6. Click on the user and navigate to “Applications”.

    Assigning the 'Hero SaaS App' to the 'hero_saas_viewer' role in OneLogin.

    Add “Hero SaaS App” and select the roles to be passed to the app (treated as Groups by Hero SaaS App).

    Viewing application assignment and status for 'Test User' in OneLogin, with 'Hero SaaS App' pending.

    Approve the user provisioning along with the Group.

    Approving 'Test User' for the 'Hero SaaS App' with assigned groups: Viewer and hero_saas_viewer.

    Finally, verify that the groups are sent to the Hero SaaS App from the administrator portal where you configured the OneLogin connection.

    Directory sync status for Your Organization, showing linked groups and user count in OneLogin.