This guide describes how to set up Okta to provision and manage your Cmd users, or to enable SSO on Cmd-enabled servers.


Supported Okta features

This integration supports the following Okta features:

  • Create users,

  • Update user attributes,

  • Deactivate users,

  • Push groups.

Table of contents

Cmd setup

  1. In the Cmd web app, click the current project’s name in the top right to open the drop-down menu.

  2. Select Project & app settings.

  3. From the left-side menu, select Security.

  4. Scroll to the bottom of the page to find the  SCIM  section, and check Enable SCIM.

  5. Click Save at the bottom of the page to generate a secret SCIM token, then copy the token and save it for later:

Okta setup

  1. In the Okta admin panel, select Applications:

    2. Click Add Application:

    3. In the 'Add Application' page, search for “Cmd”, and click Add:

    4. You can update the name of the application if you wish, then click Done:

    5. Select the 'Provisioning' tab, and click Configure API Integration:

    6. Check the box next to 'Enable API Integration'.

    7. In the 'API Token' field, enter the token you copied from the Cmd web app, and
       click Test API Credentials to validate the integration. A message reporting
       success should appear:

    8. Click Save, then To App in the settings menu on the left:

    10. Click Edit and enable 'Create Users', 'Update User Attributes' and 'Deactivate

    11. Click Save. Your new app is ready.

How to provision users and user groups

The app allows you to create Cmd accounts for Okta users. 

Cmd accounts created using SCIM start with server operator privileges. To grant more privileges, admins can edit accounts in the Cmd web app.

Individual users

  • To make Cmd accounts for Okta users, follow Okta's instructions for how to assign an app to your desired users.

  • After the app is assigned to a user, Cmd makes them an account.

  • You can see the results on the 'users & roles' settings page.

Groups of users

You can use Okta to add groups of users to Cmd, or to assign them roles


If you had a Cmd-Okta integration before some group features were supported, you must re-authenticate to Cmd's SCIM API before using them. Follow these steps:

  1. Open your Okta-Cmd app, and go to the 'Provisioning' tab.

  2. Under 'SETTINGS', go to 'Integration'.

  3. Click Edit, then Test API Credentials, then Save.


How to add groups of new users to Cmd:

  • To make Cmd accounts for a group of Okta users, follow Okta's instructions for how to assign your Cmd-Okta app to the desired group of users.

  • After the app is assigned to a group, Cmd will make accounts for the group's members.

How to assign roles to groups of existing Cmd users:

  • You can use Okta to assign roles to existing Cmd accounts. Roles enable you to define different rules for different groups of users. 

  • To add a role, use Okta's Push Groups feature to push the desired group to your Cmd-Okta app. 

  • The new Cmd user role will have the same name as the Okta user group:

  • To assign a user multiple roles, add them to multiple Okta user groups with the desired Cmd roles as their group names, and Group Push all the groups to Cmd. 

You can also read an example of how to use Cmd roles to apply different rules to different groups.


How to enable Okta SSO

Follow these steps to enable Cmd users to log in to the Cmd web app with Okta SSO. 

  1. Go to the 'Sign On' section of the Cmd app within Okta.

  2. Click Edit on the top right.

  3. Change the 'Application username format' to 'Email':

    4. Click Save.

    5. Click View Setup Instructions. This will open a document with additional
        configuration steps. Complete those steps to finish enabling SSO. The document
        also contains SSO instructions for end users. 

Related resources

To learn more about third-party integrations, including other SSO providers, see the integrations overview.


Did this answer your question?