Skip to main content
This guide explains how to connect TOTAL to Okta so administrators can sign in with Okta and be provisioned automatically. Estimated time: 30–45 minutes Audience: Okta admin, identity admin Prerequisite: You must have the values provided by TOTAL (OIDC redirect URI, plus the SCIM Base URL and SCIM Secret Token).

What you are setting up (two separate Okta apps)

TOTAL uses two Okta app integrations:
  1. OIDC app (SSO only)
    • Used for administrator sign-in to TOTAL using “Sign in with Okta”.
    • No SCIM provisioning is configured on this app.
  2. SAML app (Provisioning only: SCIM plus Push Groups)
    • Used to enable SCIM provisioning and Push Groups in Okta.
    • This app is not used for sign-in. Administrative access to TOTAL is controlled by Okta group membership:
      • Added to the admin group: provisioned and granted access
      • Removed from the admin group: deactivated on the next provisioning update

Permissions and licensing

You need permissions to manage:
● Applications (create and configure app integrations)
● Groups (create groups and assign users)
● Provisioning (requires Okta Lifecycle Management)