Burp Suite Enterprise Edition is now available in our secure Cloud  –  Learn more

Enterprise Edition

Integrating SCIM using Okta

  • Last updated: July 16, 2024

  • Read time: 4 Minutes

In this section, we'll guide you through the process of integrating SCIM with Burp Suite Enterprise Edition using Okta as your identity provider (IdP).

Prerequisites

  • Your users and groups are set up in Okta.

  • You have already created a custom app integration for Burp Suite Enterprise Edition in Okta and completed the SAML configuration.

If you want to integrate SCIM without setting up SAML, use Okta's pre-built SCIM 2.0 Test App (Header Auth) app integration from the app catalog instead. Note that in this case, some of the steps described here may vary.

Get your SCIM URL and API token

First, you need to get the SCIM URL and API token for Okta to use to communicate with Burp Suite Enterprise Edition. The process for doing this differs slightly depending whether you're using a Cloud or self-hosted instance.

  1. Log in to Burp Suite Enterprise Edition as an administrator.

  2. From the settings menu, select Integrations.

  3. On the SCIM tile, click Configure.

  4. Get your SCIM URL:

    • Your SCIM URL is automatically generated and displayed on screen for you to copy.

    • The base URL takes the following format:

      https://<host>:<port>/scim/v2

      The host is usually the same domain name or IP address as in the Burp Suite Enterprise Edition web server URL. However, this may differ depending on your network infrastructure. Enter the port that you want to use for the SCIM URL. This should be a different port than the one you use for the web server URL so that you can configure separate firewall rules for this connection.

  5. Get your API key:

    • Click Generate API token.

    • Click Save & generate API token.

  6. When prompted, copy and save the new API token somewhere secure.

Note

If you lose your API token, you can generate a new one by clicking Regenerate API token in the upper-right corner of the SCIM settings page.

Upload a TLS certificate

Okta only supports SCIM over HTTPS. This means that you need to enable TLS by uploading a PKCS#12 certificate. Make sure that the certificate has the .p12 file extension. Certificates in .psx format are not supported.

To upload a TLS certificate:

  1. From the settings menu , select Integrations.
  2. On the SCIM tile, click Edit.
  3. In Configure SCIM, activate Use TLS.
  4. Click Upload certificate.
  5. When prompted, click Choose file and select the certificate.
  6. Enter the certificate password.
  7. Click Save.

Configure the connection in Okta

Once you've got your SCIM URL and generated an API token in Burp Suite Enterprise Edition, configure the connection from Okta as follows:

Enable SCIM provisioning

  1. Log in to Okta.
  2. Go to Applications and select the app integration that you created for Burp Suite Enterprise Edition.
  3. Go to the General tab.
  4. In the App Settings section, click Edit.
  5. Under Provisioning, select the Enable SCIM provisioning checkbox.
  6. Save your changes.

Enter the connection details

  1. In Okta, select the app integration that you created for Burp Suite Enterprise Edition.
  2. Go to the Provisioning tab.
  3. From the Settings menu on the left, select Integration.
  4. In the SCIM Connection panel, click Edit.
  5. In the SCIM connector base URL field, enter your SCIM URL.
  6. In the Unique identifier field for users field, enter userName.
  7. Under Supported provisioning actions, select only the following options:

    • Push New Users.
    • Push Profile Updates.
    • Push Groups.
  8. Under Authentication mode, select HTTP header.
  9. In the Authorization field, enter the API token that you copied from Burp Suite Enterprise Edition.
  10. To confirm that the connection is working correctly, click Test Connector Configuration.
  11. Save your changes.

Configure the provisioning to app settings

  1. In Okta, select the app integration that you created for Burp Suite Enterprise Edition.
  2. Go to the Provisioning tab.
  3. From the Settings menu on the left, select To App.
  4. In the Provisioning To App section, click Edit.
  5. Use the checkboxes to enable the following settings:

    • Create Users.
    • Update User Attributes.
    • Deactivate Users.

    If you're not using SAML, enable and configure the Sync Password setting.

  6. Save your changes.

Push your Okta users and groups to Burp Suite Enterprise Edition

To push your users and groups to Burp Suite Enterprise Edition, do the following steps.

To push users:

  1. In Okta, select the app integration that you created for Burp Suite Enterprise Edition.
  2. Go to the Assignments tab.
  3. Decide how to assign your users:

    • To assign individual users, click Assign > Assign to People.
    • To assign all users from a particular group to the application, click Assign > Assign to Groups.

Warning

Assigning groups to the app integration pushes all users belonging to that group to Burp Suite Enterprise Edition. However, it does not push the actual group. To avoid synchronization issues, we recommend that you create a separate group in Okta which you only use to bulk-assign users to Burp Suite Enterprise Edition.

To push groups:

Warning

Do not push the group you created for bulk-assigning users to Burp Suite Enterprise Edition.

  1. In Okta, select the app integration that you created for Burp Suite Enterprise Edition.
  2. Go to the Push Groups tab.
  3. Click Push Groups > Find Group By Name and select the relevant group.

You may need to wait a short while for the users or groups to become available in Burp Suite Enterprise Edition. Any changes you make in Okta sync automatically. Note that users do not have access to any functionality unless you assign them to a group with the relevant roles in Burp Suite Enterprise Edition.

Was this article helpful?