Configuring Okta Integration with SCIM in Acunetix 360

Okta is an identity and access management platform. So, you can configure Okta to provision users and groups with Acunetix 360.

  • With System for Cross-domain Identity Management (SCIM) 2.0, you can organize users and user groups. This standard lets you provide a defined schema for representing users and groups. So, you can securely automate the exchange of user identity data between your cloud application and any service provider.
  • So, if you want to synchronize roles and permissions in addition to users and/or user groups, you need to configure the mapping between users/groups in Okta and members/teams in Acunetix 360.

This topic explains how to add Acunetix 360 to your Okta account and how to synchronize users and groups in Okta with Acunetix 360.


  • An Okta account
  • Admin permissions are required.
How to Add Acunetix 360 to Okta
  1. Log in to Okta.
  2. From the main menu, go to Applications > Add Application > Create New App.
  3. In the Create a New Application Integration dialog, select the connection details:
  1. From the Platform section, select Web.
  2. From the Sign on method section, select Secure Web Authentication (SWA).
  1. In the Create SWA Integration window, enter the following information:
  1. In the App Name field, enter a friendly name. (For illustration purposes, this document uses Acunetix 360).
  2. In the App's login page URL field, enter an URL.
  1. Select Finish to save the configuration.

After adding Acunetix 360 to your Okta account, you can now configure provisioning.

How to Synchronize Users/Groups in Okta with Acunetix 360
  1. Log in to Okta.
  2. From the main menu, select Applications.
  3. From the Status section, select Active > Acunetix 360.
  4. From the General tab, select Edit.
  5. From the Provisioning option, select SCIM.
  6. Now, select the Provisioning tab. Then, select Edit to configure the settings.
  • In the SCIM connector base URL field, enter (For further information about the SCIM endpoints, see
  • In the Unique identifier field for users field, enter email.
  • In the Supported provisioning actions, select all checkboxes.
  • In the Authentication Mode, select Basic Auth.
  1. In the Basic Auth section, enter your USER ID to the username field and your API Token to the password field. (For further information about accessing your API Token and User ID, see API Settings.)
  2. Select Test Connector Configuration to test the connection.
  • Select Save to save the configuration.
  1. Once you save the configuration successfully, new options will appear in the Provisioning tab. To complete the configuration, select To App, then Edit.
  2. Select the checkboxes as necessary.
  • From the Sync Password section, select Sync Okta Password as a password type.
  1. Select Save to complete the configuration.


From the Attribute Mappings section, you configure the mapping between Azure Active Directory users/groups and Acunetix 360 members/teams.


In order to push your group(s) in Okta to Acunetix 360 as team(s), you need to go to Push Groups > Find Groups by Name and find your group. Then, save it. Once you save it, Okta will push your group(s) to Acunetix 360 automatically.

After completing the instructions, you can now add users and/or groups to Acunetix 360. To do this, from the Assignments tab, select Assign and start adding users and groups.

When you delete user(s) from the Acunetix 360 application in Okta, these users become Disabled on the Acunetix 360's side.

« Back to the Acunetix Support Page