Skip to main content

Manage Single Sign-on and Mondoo Access with Okta

Set up Okta as your authentication provider so you can:

  • Enable users to log into Mondoo with their Okta account
  • Control who has access to Mondoo using Okta
  • Centrally manage users with Okta

Configuring single sign-on allows Okta to handle authentication (verifying that a user is who they say they are) for Mondoo. Configuring user management allows you to use Okta user groups to authorize access to Mondoo.

You can choose to set up Okta single sign-on but not Okta user management. However, you can't use Okta for Mondoo user management without first setting up Okta single sign-on.


To configure the integration, you need:

Let your Mondoo representative know that you want to enable Okta single sign-on for your Mondoo Enterprise account. The Mondoo team executes the final step in configuring Okta single sign-on using information you provide.

Configure Okta single sign-on for Mondoo (using OIDC)

To allow users to log into the Mondoo Console with their Okta-provided credentials, you create an Okta app integration for Mondoo. This implementation relies on OpenID Connect (OIDC) to authenticate users.

  1. Log into your Okta Admin Console.

  2. In the left menu, select Applications.

    Okta applications

  3. Select the Create App Integration button.

    Okta new app integration

  4. For the Sign-in method, select OIDC - OpenID Connect and for the Application type, select Single-Page Application. Then select the Next button.

    Okta new app integration

  5. For the App integration name, enter Mondoo.

  6. For Grant type, select Authorization Code and Refresh Token.

  7. For the Sign-in redirect URI and Sign-out redirect URI, enter the private domain you type to access the Mondoo Console, such as

  8. For Assignments, choose to limit access to selected groups and enter the specific groups names.

  9. Select the Save button.

    Okta creates the app integration.

    Okta applications

  10. On the General tab of the app integration properties, copy the Client ID. Share this with your Mondoo representative.

  11. In the top-right corner of the Okta Admin Console, select the drop-down beside your user ID.

Okta issuer ID

Below your name and email address is an Issuer ID. Select the Copy to Clipboard icon beside the Issuer ID. Share the Issuer ID with your Mondoo representative.

The Mondoo team uses the Client ID and Issuer ID to enable Okta single sign-on for your Mondoo Enterprise account. After we let you know we've executed this final step, it can take 10-20 minutes before users can log into Mondoo using Okta single sign-on.

Manage Mondoo users with Okta (using SCIM)

To centralize user management for your organization, give your Okta account full control over who can access organizations and spaces and perform different tasks in Mondoo. This implementation relies on the System for Cross-domain Identity Management (SCIM) protocol. Mondoo's SCIM support lets you give Okta groups access to organizations and spaces in your Mondoo Enterprise instance.


Before you set up Okta user management for Mondoo, you must first configure Okta single sign-on by following the steps above.

Step A: Create a new Mondoo API token

  1. In the Mondoo Console, create a new API token with edit permission to your Mondoo organization..

  2. Copy the generated token and save it. You need it for many of the steps below.

Step B: Identify your SCIM base URL

Determine your SCIM base URL using the URL you use to access the Mondoo Console: Replace console with api and add /scim/v2. So if your Mondoo Console URL is:

then your SCIM base URL is:

Step C: Verify that SCIM is enabled for your Mondoo instance

Confirm that the Mondoo team has successfully enabled SCIM support for your Mondoo Enterprise instance.

  • For YOUR-API-TOKEN, substitute the token you created in the step above.

  • For YOUR-SCIM-BASE-URL, substitute the SCIM base URL you identified in the step above.

$ curl -i -X GET -H "authorization: Bearer $TOKEN" YOUR-SCIM-BASE-URL/Users
HTTP/2 200
content-type: application/scim+json
vary: Origin
vary: Accept-Encoding
date: Thu, 16 May 2024 21:09:36 GMT
content-length: 130
via: 1.1 google
alt-svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000


If this test is unsuccessful, contact your Mondoo representative.

Step D: Create a SCIM application in Okta

  1. Log into your Okta Admin Console.

  2. In the left menu, select Applications.

    Okta applications

  3. Select the Browse App Catalog button.

    Okta catalog search

  4. Use the catalog search box to search for “SCIM 2.0 Bearer” and select the “SCIM 2.0 Test App (OAuth Bearer Token)” application.

    Okta SCIM application

  5. Select the Add Integration button.

    Add Okta SCIM application

  6. On the General Settings tab, keep the default options and select the Next button.

  7. Your Mondoo-Okta integration doesn't use any of that information on the Sign-On Options: Required tab, so just select the Done button.

Step E: Provision users in Okta

  1. Select the Provisioning tab, select Configure API Integration, and check the Enable API Integration box.

    Okta provisioning

  2. In the SCIM 2.0 Base Url box, enter the Mondoo SCIM base URL that you identified in the step above.

  3. In the OAuth Bearer Token box, paste your Mondoo API token.

  4. Select the Test API Credentials button to confirm that the token and URL you provided give Okta the access it needs.

  5. Select the Save button.

  6. In the left menu, select ToApp. Select Edit and enable these capabilities:

    • Create Users
    • Update User Attributes
    • Deactivate Users
  7. Select the Assignments tab and use the Assign button to add the groups to which you want to grant Mondoo access.

  8. Select the Push Groups tab and use the Push Groups button to be sure the same groups are added as in step 7.

Step F: Identify Mondoo organization and space IDs

To find the ID of an organization and a space:

  1. In the top navigation bar of the Mondoo Console, select your region. Mondoo displays all organizations in the region.

    Mondoo organization ID

    Note each organization's ID in smaller text below the organization name. In the image above, the organization IDs are blissful-mcnulty-255959 and dewey-marzipan.

  2. Select the organization containing the space you want and, in the side navigation bar, select Spaces.

    Mondoo spaces

  3. Select the space you want and, in the side navigation bar, select Settings.

    Mondoo space ID

    On the General Settings tab, note the ID of the space in the first field, Name (A unique ID used to identify this space). In the image above, the space ID is bunny-ears-chopsticks.

Step G: Grant Mondoo organization and space access using cURL

Create a new file named scim-mapping.gql and containing a GraphQL request based on this sample:

"query": "mutation {\n setScimGroupMapping(\n input: {\n orgMrn: \"//\",\n group: \"API Admins\",\n mappings: [{\n orgMrn: \"//\",\n #spaceMrn: \"//\",\n iamRole: \"//\"\n },{\n #orgMrn: \"//\",\n spaceMrn: \"//\",\n iamRole: \"//\"\n },{\n #orgMrn: \"//\",\n spaceMrn: \"//\",\n iamRole: \"//\"\n }]\n }\n ) {\n group\n }\n}"
YOUR-ORG-IDThe ID of the organization to which you want to grant a group access
YOUR-SPACE-IDThe ID of the space to which you want to grant a group access

Execute the query:

$ export TOKEN='eyJhbGciOiJF...'
$ curl -i -X POST -H "content-type: application/json" \
-H "authorization: Bearer $TOKEN" -d @scim-mapping.gql \

Learn more