With 1Password Business, you can integrate 1Password with Okta to automate many common administrative tasks:
Provision
- Create users: Assigned users and groups will be provisioned to 1Password.
To sync groups from your directory to 1Password, use Push Groups.
- Update user attributes: Changing user attributes in your directory will change the mapped attributes in 1Password.
- Deactivate users: Deactivating a user or disabling the user’s access to 1Password in Okta will suspend the user in 1Password.
Import
- Import users and groups: Existing 1Password users and groups will be imported and can be linked to existing Okta objects.
Manage groups
- Push Groups: Use Push Groups to sync groups from your directory to 1Password or manage existing 1Password groups in Okta.
To provision users to 1Password, use Okta group assignments.
To get started, sign in to your account on Okta.com , click Admin in the top right, and follow these steps.
Before you begin
Before you can integrate 1Password with Okta, you’ll need to:
- Set up and deploy 1Password SCIM Bridge.
- Have the lifecycle management feature in your Okta account.
- Make sure Provisioning users & groups is turned on in the Automated User Provisioning page of your 1Password account.
Step 1: Add the 1Password Business application to Okta
To add the 1Password Business application to Okta:
- Click Applications, then click Browse App Catalog.
- Search for 1Password Business and choose it, then click Add Integration.
- Choose the region for your 1Password account, then enter the beginning of your sign-in address (for example:
acme
) and click Next. - Choose Bookmark-only from the sign on methods and click Done.
You’ll see the details of the application you just created.
Step 2: Configure the application
On the 1Password Business application details page, click Provisioning. Then follow these steps.
2.1: Set up API integration
Click Configure API Integration, then turn on Enable API Integration.
Enter your Base URL and API Token.
Base URL: the URL of your SCIM bridge (not your 1Password account sign-in address). For example:
https://scim.example.com
If you don’t know your URL, make sure you’ve set up and deployed the SCIM bridge.
API Token: the bearer token for your SCIM bridgeLearn what to do if you don’t have your bearer token.
Click Save.
If you see "Error authenticating" when you set up the integration, open your Integrations page on 1Password.com and make sure provisioning is turned on.
2.2: Set up provisioning to 1Password
Click Assignments and assign the users and groups you want to provision to 1Password. Then follow these steps:
- Click Provisioning and choose To App in the sidebar.
- Click Edit and turn on these options:
- Create Users
- Update User Attributes
- Deactivate Users
- If you want to customize the attribute mappings, refer to the default mappings below.
- Click Save.
Next steps
When you turn on provisioning, existing 1Password users will be linked to Okta users if their email address matches. If their email address is different, they’ll be invited to 1Password again, so make sure any affected team members update their email address before you turn on provisioning.
If you have existing groups in 1Password that you want to sync with Okta, add them to the groups managed by provisioning:
- Sign in to your account on 1Password.com.
- Choose Integrations in the sidebar and choose Automated User Provisioning.
- Choose Manage in the Managed Groups section, then select the groups to sync.
If you’ve previously used 1Password SCIM Bridge, make sure to select any groups that were already synced with Okta. This will prevent problems syncing with your identity provider, including duplicate groups.
Manage your settings
To turn off synchronization, click Active and choose Deactivate.
To change the region to match your 1Password account, click General, then change Region Type.
Learn more on the Okta Help Center.
Get help
If users and groups aren’t being provisioned, make sure provisioning is turned on in your 1Password account:
- Sign in to your account on 1Password.com.
- Choose Integrations in the sidebar.
- Choose Automated User Provisioning.
- Make sure Provisioning users & groups is turned on.
Appendix: Attribute mappings
The following are the default attribute mappings for the 1Password Business application in Okta:
1Password attribute | Okta attribute | Description |
---|---|---|
userName | Okta username | The team member’s username and email address. |
givenName | firstName | Their first name. |
familyName | lastName | Their surname. |
Learn how to map Okta attributes to app attributes in the Profile Editor.