Artificial Intelligence (AI)
Big data analytics with Starburst
Secure from Code to Cloud
MITRE ATT&CK (tactics, techniques, matrix, IDs)
Prisma Cloud in 60s
Changed focus – The world of…
Horizon – Brokering
Horizon Golden Master – Best practice
Horizon Cloud on Azure
Horizon Cloud on Azure – How to start with subscription

Modern Workplace and Management with the efficiency of pure Cloud – Part 12 (Attribute mapping Okta)

Check Attribute mapping – Okta

To make the whole process works if you implemented the compete scenario (Workspace ONE Access and UEM, Okta and Microsoft Azure) we have to make sure that the user attribute mapping is correct. So, you have to check the attribute mapping from Okta User to Microsoft Office 365 application in the Okta tenant as well. Reason behind that is, that the immutableId attribute in Azure AD will be matches with the external ID which the user gets from Okta and is provisioned to Workspace ONE Access as ExternalID and to Workspace ONE UEM as Azure Active Directory Mapping Attribute in the user account.

Then the user can be mapped and enroll their devices into Azure AD as far as they have the license assigned and available.

  • Log into Okta
  • Directory
  • Profile Editor
  • Click Mappings at Microsoft Office 365
  • On the top choose Okta User to Microsoft Office 365
  • Enter for the immutableId user.getInternalProperty(“id”)
    • Sometimes the (“) will not be correctly set. Then set it again with after all text was entered
  • At the bottom you can enter a user account to test the mapping in a preview
  • You should see the mapping with the ExternalID from Okta
  • Exit Preview
  • Save Mappings
  • Then you will be asked to apply these mappings to all users with this profile
  • Apply updates now
  • Save Mappings
1067 Total Views 1 Views Today

Leave a Reply

Your email address will not be published. Required fields are marked *