Overview
This guide is intended to help IT Administrators setup SCIM provisioning for Reclaim.ai via Okta.
Note: SCIM is currently only available for authentication to users with primary calendars from Google; SCIM is not yet available for Microsoft O365 calendars, but we are tracking/working on this.
This is for creating a new "Custom App" while the Reclaim.ai App in the Okta App Catalog is under review.
If you need any additional assistance beyond this guide, please reach your to your Reclaim.ai contact/rep, or support via our website and/or [email protected].
Pre-Requirements
Setup on a Reclaim.ai Enterprise Plan (see: https://reclaim.ai/pricing) or a Business Trial
Have your domain enabled/configured for SSO in Reclaim.ai
Have a "Auto Capture" enabled on your Reclaim Team (if you are unsure if this is the case, ask your contact/rep and/or [email protected]).
Have a Google Service Account setup and enabled (see: https://help.reclaim.ai/en/articles/6520530-using-google-workspace-service-accounts-to-roll-out-reclaim-to-your-enterprise)
Have an "Admin" Role on your Reclaim Team - You can check the Team Billing Page (https://app.reclaim.ai/billing) for your Team to verify this.
Administrator access to your Okta Account/Dashboard
For 1-4: Work with your Reclaim.ai contact/rep or reach out to [email protected] if you are unsure.
Create an API Key in Reclaim.ai
Login to Reclaim.ai (https://app.reclaim.ai/login)
In your URL bar enter: https://app.reclaim.ai/settings/developer
Generate a new API Key:
Enter a Name for the key, such as "Okta SCIM"
Set Expiration to "Never" (or whatever is appropriate for your security policy)
Click "Generate key"
Click the "Copy" icon to copy the key to your clipboard
Save the key some place secure for future use
Now you can continue on with the Okta portion of the setup.
Create a new App Integration in Okta for SCIM
This step will create a new custom application integration for SCIM for Reclaim.ai in Okta. This is in addition to the ODIC App you created for SSO.
The current Reclaim.ai App in the Okta App Catalog is currently only for SSO; an updated version including SCIM support has submitted to Okta for approval in their App Catalog, and this guide will be updated when that is complete. For now, follow the steps below to setup Reclaim.ai as a custom Application Integration specifically for SCIM.
Login to Okta as an Admin
From the Left nav goto: Applications->Applications
From the Applications screen, click “Browse App Catalog”:
From the “Browse App Catalog” screen:
From the “SCIM 2.0 Test App (Header Auth)” screen click the "Add Integration" button:
On the "SCIM 2.0 Test App (Header Auth)" page:
On the "Sign-On Options· Required" page:
The application has been created but we need to configure the Provisioning API. From the main screen of the App you just created, click the "Provisioning" tab and then the "Configure API Integration" button:
From the "Enable API Integration" page:
Ensure the "Enable API Integration" box is checked
For "Base URL" enter: https://api.app.reclaim.ai/scim/v2
For "API Token" enter "Bearer RECLAIM_API_KEY" you created at the start of this guide. For example, if your RECLAIM_API_KEY was 877dfde9-1676-4ae2-80d5-67c9c0a970e1, you would paste:
Bearer 877dfde9-1676-4ae2-80d5-67c9c0a970e1
in as the value for API Token.
Click "Test API Credentials"
You should see a notification indicating verification was successful.
Click "Save"
On the "Provisioning" screen click "To App" on the left:
Click the "Edit" button
Check the "Enable" box for:
Create Users
Update User Attributes
Deactivate Users
Click "Save"
The Okta App for SCIM Provisioning on Reclaim.ai has been created and should be ready to use.
Configuring Base Attributes in Okta
You must verify that the attribute mapping between Okta and Reclaim is correct. This will ensure that Reclaim can get the correct data from Okta.
In Okta, select the Reclaim app > Provisioning.
Click into the To App tab on the left-hand side.
Scroll down until you see a table towards the bottom under the Reclaim Attribute Mappings section. On this page, you'll see the default attribute configurations.
Click the pencil icon to the right to change the mapping for any of these attributes. A popup will appear with a dropdown giving options of Okta fields to map to this Reclaim field.
Choose the field from Okta you want to sync into Reclaim and click Save.
Whenever a user is created or updated in Okta, this table tells Okta how to source the value for a particular attribute. If these mappings are not configured correctly, you may notice that some attributes aren't syncing properly.
Configure Reclaim-specific attributes
Reclaim supports other user fields such as an employee's hire date, job category, and location. Since these are not included in the default mappings, you must manually link these fields. This can all be done through the profile editor.
Note: Okta allows you to add any custom attribute (although hire date, job category, and location are common) to Reclaim following the steps below. However, all default fields must be set up for the sync to work correctly.
Within the Provisioning tab, scroll down and click on Go to Profile Editor.
If you don't already have attributes for hire date, job category, location, team, , and role, you can add new attributes by clicking Add attribute.
You will then see a form to enter your values.
Save.
Once you add these attributes, you must populate those values for your users by editing their profiles. Note that none of these additional values are required, but if you define them, you must make sure they have the correct configuration:
Location
Data type:
string(example: "Berlin, DE")Variable name:
locationExternal name:
locationExternal namespace:
urn:ietf:params:scim:schemas:extension:reclaimai:2.0:UserAttribute required: Not required (do not select).
Scope: User Personal should be selected.
Hire Date
Data type:
date(format: yyyy-MM-dd'T'HH:mm:ssX)Variable name:
hireDateExternal name:
hireDateExternal namespace:
urn:ietf:params:scim:schemas:extension:reclaimai:2.0:UserAttribute required: Not required (do not select).
Scope: User Personal should be selected.
Job Category
Data type:
string(example: "Software Engineering")Variable name:
jobCategoryExternal name:
jobCategoryExternal namespace:
urn:ietf:params:scim:schemas:extension:reclaimai:2.0:UserAttribute required: Not required (do not select).
Scope: User Personal should be selected.
Organization Role
Data type:
string(example: "SRE")Variable name:
orgRoleExternal name:
orgRoleExternal namespace:
urn:ietf:params:scim:schemas:extension:reclaimai:2.0:UserAttribute required: Not required (do not select).
Scope: User Personal should be selected.
Team
Data type:
string(example: "Cloud Operations")Variable name:
teamExternal name:
teamExternal namespace:
urn:ietf:params:scim:schemas:extension:reclaimai:2.0:UserAttribute required: Not required (do not select).
Scope: User Personal should be selected.
Other Custom Attributes
Custom attributes created in Reclaim can also be updated via Okta SCIM. The variable name and external name should match the name given to the attribute in Reclaim, converted to camelCase. For example, a custom attribute called "Job Level" should have the following settings configured in Okta:
Data type:
string(example: "Manager 4")Variable name:
jobLevelExternal name:
jobLevelExternal namespace:
urn:ietf:params:scim:schemas:extension:reclaimai:attributes:2.0:UserAttribute required: Not required (do not select).
Scope: User Personal should be selected.
You have successfully configured Okta to provision users into Reclaim. You must assign your users to the Reclaim SCIM app; otherwise, Okta won't know which users to provision into Reclaim.
Provisioning Users via SCIM
There are two ways of assigning (provisioning) users to the Reclaim.ai SCIM App:
You can assign them individually
You can assign via using an Okta Group
For both, start on the "Assignments" tab of the Reclaim.ai SCIM App screen:
Individual Assignment
In the Reclaim.ai SCIM App, with the "Assignments" tab, click the "Assign" button and then "Assign to People".
You may assign the app to whichever users you want provisioned in Reclaim.ai by clicking "Assign" next to each user; click "Done" when finished. This will then provision, or update, in Reclaim.ai every user that has been assigned.
Group Assignment
As an alternative to individual assignment, you can leverage Okta Groups.
In the Reclaim.ai SCIM App, with the "Assignments" tab, click the "Assign" button and then "Assign to Groups".
You may assign the app to whichever Okta Group you have created by clicking "Assign" next to each group; click "Done" when finished. This will then provision, or update, in Reclaim.ai every user assigned to that Okta group.
Provisioning Time
The time to provision users in Reclaim.ai should be almost immediate, but could depend on the number of users or size of group. It most cases, everything should be complete in a few minutes.









