Integrate Kisi with Okta
This is a Kisi-built integration, maintained and supported by Kisi.
As a Kisi organization owner you can set up Okta single sign-on (SSO) for your Kisi users. To further control your SSO integration, you can sync it with your Okta directory members and groups with SCIM.
Kisi organizations with single sign-on (SSO) can, if needed, also enable authentication with password for users. If enabled, the user will be able to log in with email and password. If the user is in the organizations' IdP directory, an SSO login will also be available.
Before you begin
Before setting up the integration, make sure you have a valid and activated SSO license. Otherwise, the SSO & SCIM option won't show up in your admin dashboard.
Enable SSO on Okta
Set up the integration in Okta
- Sign in to Okta and ensure you are using the classic UI interface (top-left corner)
- From the main navigation click on Applications and select Add Application
- Open the dropdown menu and look for the Kisi Physical Security app
- Click Add
- On the following General Settings page, click Done
- In the Kisi Physical Security app detail page, click on the Sign On tab
- Click Identity Provider metadata and copy the Metadata URL
Set up the integration in Kisi
- Sign in to Kisi
- Under Organization Setup, click on SSO & SCIM and paste the metadata URL that you saved in the step above
- Click Save
- Click Generate Certificate
Now that you have generated the encryption certificate, go back to Okta and follow the steps below to complete the configuration.
- In the Kisi Physical Security SAML app in Okta, click on the Sign On tab
- Under Settings, click Edit
- In the Encryption Certificate field, upload the encryption certificate that you have previously downloaded in Kisi
- In the Domain field, enter your Kisi domain. (You can find your Kisi organization domain under Organization Setup > Settings)
- Click Save
As a last step, make sure you assign people or groups from Okta to the Kisi application.
- Navigate to the Kisi Physical Security SAML app in Okta, look for the Assignments tab, and click on Assign
- Choose to Assign to people or Assign to groups
Enable SCIM on Okta
Before you start, make sure you have SSO set up for your organization. Then just follow the next steps to generate a SCIM token and add the Kisi Physical Security app in Okta.
Okta's SCIM implementation doesn't allow deleting of users in other applications and thus users that are removed in Okta are not removed in Kisi. We recommend doing regular audits and clean up of suspended users.
Generate your SCIM Token in Kisi
- Sign in to Kisi
- Under Organization setup click on SSO & SCIM
- Enable SCIM and click on Generate Token
- Copy the token (shown once)
Set up SCIM with Okta
- Sign in to Okta and ensure you are using the classic UI interface (top-left corner)
- Click on Admin, select Applications, and select your Kisi Physical Security app from the list
- Navigate to the Provisioning tab, and click Configure API Integration
- Click on the Enable API Integration checkbox and enter your SCIM token (without the leading Bearer if present)
- Click Test API Credentials
- Once a success message is displayed above the Enable API Integration checkbox, click Save
- Navigate to the Provisioning tab, and under Settings select To App
- Click Edit and enable Create Users, Update User Attributes and Deactivate Users
- Click Save
As a last step, you need to assign users under Push Groups.
Push Okta Groups to Kisi
- In the Kisi Physical Security SAML app in Okta, click on Push Groups
- Select Find Groups by name
- Search for the Okta group you want to push to Kisi
- Under Match result & push action choose to either Create Group or Link Group
For more details on how to configure Okta, please visit SCIM: Provisioning and Deprovisioning Kisi Organization Members with Okta.
Restrict Kisi emails for managed users
If you are a Kisi partner and you manage users yourself, you may not want them to receive emails from Kisi. You can restrict this by using the sendEmails
custom attribute. This attribute can only be set when the user is created in Kisi, and cannot be updated later.
Please note that the sendEmails
attribute should only be used for managed users. Setting it to false
will disable all Kisi emails, including the emails that are required for creating password and signing in.
- In the Kisi Physical Security SAML app in Okta, click on Provisioning
- Click Go to Profile Editor
- Click Add Attribute
- Select Data type
boolean
- Fill in the form as follows:
- Display name:
Send Kisi emails
(or what makes sense for you) - Variable name:
sendEmails
- External name:
sendEmails
- External namespace:
urn:ietf:params:scim:schemas:core:2.0:User
- Scope: Check the box next to User personal
- Click Save
Now, when you assign a user to your Kisi Physical Security app in Okta, you can select whether or not they should receive emails. If you always want the same value for all of your users, follow the steps below.
- In the Kisi Physical Security SAML app in Okta, click on Provisioning
- If the
sendEmails
attribute is not already shown in the list, scroll down and click on Show Unmapped Attributes - Click on the pencil icon for the
sendEmails
attribute - Select Same value for all users in the Attribute value dropdown
- Select the value you want applied to all users in the second dropdown
- Make sure Apply on is set to
Create
- Click Save