Couchdrop Knowledge Base
Couchdrop HomepageDevelopersLogin
  • Welcome
  • Features
    • SFTP Server
      • Storage
      • Users
      • How to connect
      • Enabling FTPs
      • Host key authentication
    • Transfer Automations
      • Creating an Automation
      • Supported Actions
      • Variables
      • Troubleshooting
    • Shared Links
    • Upload Links
    • Inbound Mailboxes
    • Inbound Webhooks
    • File Actions
    • Inbound AS2 Stations
  • Administration
    • Users and Groups
      • User Roles
      • Creating Users
      • The Root Directory
      • Passwords and RSA Keys
      • Features Access
      • Firewalls and ACLs
    • Storage Connections
      • SharePoint
      • Azure Files
      • Amazon S3
      • Google Workspace
      • Google Drive
      • Box
      • Dropbox
      • Egnyte
      • Outbound AS2
      • External SFTP Server
      • Windows / Mac File Server
        • Server Requirements
        • Proxy Configuration
        • Non-GUI Environments
        • Running the Couchdrop Agent as a Service
        • Logging and Debugging
      • Others
        • OneDrive
        • Azure Blob
    • Folder Permissions
    • Alerting and Notifications
    • Custom Domains
    • SSO and Single Sign-on
      • SAML SSO
      • SCIM - Azure
      • SCIM - Okta
    • Security
      • Password Policies
      • Account Lockout
      • Account expiry
      • Two Factor Authentication
    • Other
      • Static IPs
      • Malware Scanning
  • Walkthroughs
    • Using SFTP Clients
      • OpenSSH SFTP
      • How to use SFTP with Cyberduck
      • How to use SFTP with FileZilla
      • Using SFTP with Golang
      • Using Python with SFTP
      • Using SFTP with Java
      • Using SFTP with Bash
      • Using SCP
    • SFTP To SharePoint
    • SFTP to Azure Files
    • Automated file transfers to SharePoint
    • Email Inboxes with Couchdrop
    • Delegating Domain-Wide Authority in Google Workspace
  • Other
    • FAQs
    • Trust/Security Center
    • Login to Couchdrop
    • API Documentation
Powered by GitBook

Couchdrop

  • Homepage
  • Register
  • Login

Platform

  • Cloud SFTP Server
  • Cloud FTP Server
  • Automated Transfers
  • Mailboxes and Inboxes

Copyright Couchdrop Limited 2025

On this page
  • Supported Features
  • Configuration Steps

Was this helpful?

Export as PDF
  1. Administration
  2. SSO and Single Sign-on

SCIM - Okta

Learn how to configure Couchdrop to sync with Okta

PreviousSCIM - AzureNextSecurity

Last updated 2 months ago

Was this helpful?

This guide will help you if you want to provision Users between Okta and Couchdrop.

Supported Features

  • Push Users Users created in Okta will also be created in Couchdrop

  • Push User Updates User updates in Okta will be pushed to the corresponding users in Couchdrop

  • User deactivation Users deactivated in Okta will be deactivated in Couchdrop

  • Push Groups Groups created in Okta will also be created in Couchdrop

  • Push Group updates Group updates in Okta will be pushed to the corresponding users in Couchdrop

  • Group deactivation Groups deactivated in Okta will be deactivated in Couchdrop

  • Import Users Users created in Couchdrop can be imported into Okta

  • Import Groups Groups created in Couchdrop can be imported into Okta

Configuration Steps

Create User Provisioning Token in Couchdrop

Navigate to in Couchdrop’s interface and create a new Provisioning Token. This will be used in the Azure Active Directory provisioning process.

Setup an SCIM Application for User Provisioning in Okta

Select and configure the Couchdrop SCIM application from the Okta Application Catalogue.

Under Application - Application select Browse App Catalog

Search for Couchdrop SCIM and select the application

Click on Add Integration and then on Done

Assign User and Groups to the Application

Then configure the user provisioning by selecting the Provisioning tab and click Configure API Integration

Check the Enable API integration checkbox, provide the User Provisioning Token which you configured in the Couchdrop SSO interface into the API Token field and click Test API Credentials to verify the token and hit Save.

Select Edit and enable Create User, Update User Attributes and Deactivate Users

Configure user and group import from Couchdrop to Okta

If you want to import users and groups from Couchdrop into Okta select the To Okta Setting on the Provisioning Tab and select the scheduled import frequency and matching rules.

Then on the Import Tab click the Import Now button

You will see a list of all potential users and groups to import and can select the one you wish to import into Okta

and click Confirm Assignments to trigger the import.

02_Select_Couchdrop_App

04_Add_Couchdrop_SCIM_Done
05_Assign_Users
06_Configure_Provisioning
07_Enable_API_and_test
08_Edit_Provisioning
09_Edit_Provisioning

To push groups and their memberships from Okta into Couchdrop you can use the Push Group option. More information about this can be found

10_Groups_push
11_ToOktaImport
12_ImportResults
13_Assign_overview
14_assign_confirm
here
User Provisioning