Set Up SAML SCIM for 6sense Legacy Okta OIN App

Prev Next

This article explains how to enable SCIM-based user provisioning for customers who are already using the legacy, pre-integrated 6sense Okta OIN application.

If this does not apply to you, use the guide Enabling SAML SCIM.

Important – Legacy Application Only

The 6sense Okta OIN application described in this article is a legacy application.
It must not be used for new SSO deployments.

Only customers who installed the 6sense Okta OIN app before November 13, 2025, should follow this guide.

SCIM is included in Advanced Security as an optional feature and is not enabled by default. To request enablement, please contact your Customer Success Manager (CSM).

Prerequisites:

Before enabling SCIM, ensure the following:

  • You have admin access to your Okta account.

  • You have a 6sense application administrator account.

Supported SCIM Provisioning Features

User lifecycle management

  • Create: Automatically provision new users when assigned in Okta.

  • Update: Sync profile updates (such as name and email) in real time.

  • Deactivate: Automatically deactivate users when unassigned in Okta.

  • Reactivate: Re-enable users when reassigned.

Import features (not supported)

Import features (Import New Users, Import Profile Updates) are not supported. User provisioning is unidirectional, from Okta to 6sense only. Changes made directly in 6sense are not synced back to Okta.

Group push (not supported)

Group Push is not supported; groups cannot be pushed from Okta to 6sense. Groups will only be used for assignment of users to the 6sense application.

Set up SAML SCIM for Okta OIN

SCIM configuration requires actions in both Okta and the 6sense application.

1 - Enable provisioning in Okta

Step 1: In Okta

  1. Log in to the Okta Admin Console.

  2. Navigate to Applications > Applications.

  3. Search for 6sense and select the application.

  4. Go to the Provisioning tab.

  5. Select Integration.

  6. Check Enable API Integration.

Step 2: In 6sense

  1. Next, open the 6sense application in a new browser tab.

  2. Navigate to Settings > Security and Compliance > Identity and Access.

  3. Click Open setup portal.

  4. Click Add on the SCIM configuration tile.

  5. Select Okta as the Identity Provider.

  6. On the Configure SAML & SCIM provisioning step:

    1. Click Generate Key to create an API token.

Step 3: In Okta

  1. Click Copy the token and paste it into the API Token field in Okta.

  2. Click Test API Credentials.

  3. On success, click Save.

Step 4: In 6sense

  1. Return to the setup portal.

  2. Click Finish.

  3. On the next step, disable JIT (Just-In-Time) provisioning.

  4. Click Save.

Important:

After enabling SCIM, JIT provisioning must be disabled.
Once SCIM is active, all user creation and updates are managed through SCIM. Leaving JIT enabled can result in duplicate or unintended user creation.

2 - Configure provisioning settings in Okta

  1. Under the Provisioning tab, select To App from the left menu.

  2. Click Edit in the provisioning settings.

  3. Enable the following options based on your needs:

    1. Create Users: Automatically create new users in the application.

    2. Update User Attributes: Update user information when changed in Okta.

    3. Deactivate Users: Deactivate users in the application when deactivated in Okta.

  4. Select Save.

3 - Standard attributes

The following standard attributes are mapped automatically:

  • Username: Mapped from email (required)

  • Email (required)

  • Given name (required)

  • Family name (required)

6sense does not support any other attribute mapping.  

4 - Assign users

The user must be assigned to the 6sense application in Okta, either directly or through a group assignment. Groups are not displayed in 6sense user management; they are used only for quick user assignment.

  1. Navigate to the Assignments tab.

  2. Click Assign and choose either:

    1. Assign to People: Assign individual users.

    2. Assign to Groups: Assign entire groups.

  3. Select the users or groups you want to provision.

  4. Click Save and Go Back for each assignment.

  5. Click Done when finished.

5 - Verify provisioning

  1. After assigning users, navigate to Provisioning > To App.

  2. You should see provisioning tasks being processed.

  3. Check in 6sense user management (Settings > User management > Organization users) to verify that users have been created with the SSO default role per your subscription.

Troubleshooting

Users not provisioning

  • Ensure API integration is enabled.

  • Check that users are assigned to the application in Okta.

  • Check that the 6sense SSO portal shows SCIM configuration shows enabled and Disable JIT provisioning is checked and saved.

Test API credentials is failing

  • Ensure SCIM API key entered in Okta is copied correctly.