Background

This article provides background on the required roles and permissions for the Lumos Okta integration.

Required plan

There's no minimum plan or subscription required to connect the Okta integration. Super Administrator is recommend for full functionality, with options to configure the integration in a read-only manner.

(API Token) Required roles & permissions

If you choose to connect to Okta via an API token, it's important to note that an Okta API token inherits the permissions of the Okta user account that creates it. We recommend creating a dedicated Okta user account to connect the integration to Lumos, so that permissions aren't tied to a specific employee.

Using a Super Administrator role in Okta for the integration user will get you up + running in Lumos as quickly as possible!

Custom roles

If you want to limit scopes, you can create a custom Okta admin role for your integration.

However, it's worth noting that custom admin roles currently don't allow you to modify group memberships of Okta users who are super administrators. Any attempt to add or remove Super Administrators from Okta groups via Lumos will fail if you use a custom admin role. A Super Administrator role is also needed to list Admin roles in Okta. This is required if you want to view Okta admin roles in Lumos, which you might do during an Access Review. See 📄 Using Lumos for Access Reviews

To unlock the full functionality of Lumos, we need the following Okta roles:

The custom role needs the following permissions to unlock as much Lumos functionality as possible:

Read-Only Configuration

It's possible to connect Okta to Lumos with read only access, but you'll be unable to make any changes to users, groups, or applications. Additionally, Okta Admin Groups will not be synced without Super Admin.

This will prevent you from using the AppStore or removing app access automatically after an access review.

To do this, you will need the 2 roles:

(OAuth) Required scopes

The following scopes are requested via the OAuth integration. The user completing the OAuth connection must have the authorization (role + permissions) to grant the scopes being requested.

Any *.manage scope can be replaced with a read scope if read-only permissions for Lumos are desired.

When listing these scopes to connect the integration app within Lumos, be sure to use an empty space to separate each scope (not a comma).

More context on the scopes in Okta can be found here.

Scope

Context

Notes

okta.users.manage

Allows the app to create new users and to manage all users' profile and credentials information.

Can be replaced with okta.users.read for read-only permissions.

okta.apps.manage

Allows the app to create and manage Apps in your Okta organization.

Can be replaced with okta.apps.read for read-only permissions.

okta.groups.manage

Allows the app to manage existing groups in your Okta organization.

Can be replaced with okta.groups.read for read-only permissions.

okta.roles.read

Allows the app to read administrative role assignments for users in your Okta organization.

 

okta.logs.read

Allows the app to read information about System Log entries in your Okta organization.

 

okta.schemas.read

Allows the app to read information about Schemas in your Okta organization.

 

(API Services Integration) Required Scopes

The following scopes are requested via the API Services integration. The user completing the API Services connection must have the authorization (role + permissions) to grant the scopes being requested. In order to allow full syncing and provisioning capabilities, Super Administrator is required.

More context on the scopes in Okta can be found here. The following are scopes requested by Lumos:

Context

Notes

okta.users.manage

Allows the app to create new users and to manage all users' profile and credentials information.

Can be replaced with okta.users.read for read-only permissions.

okta.apps.manage

Allows the app to create and manage Apps in your Okta organization.

Can be replaced with okta.apps.read for read-only permissions.

okta.groups.manage

Allows the app to manage existing groups in your Okta organization.

Can be replaced with okta.groups.read for read-only permissions.

okta.roles.read

Allows the app to read administrative role assignments for users in your Okta organization.

 

okta.logs.read

Allows the app to read information about System Log entries in your Okta organization.

 

okta.schemas.read

Allows the app to read information about Schemas in your Okta organization.

 

Read Only Option

Lumos allows connecting a read-only scoped version using Okta's API Services.

To do this, you will need to create another role with permissions that are not granted through the Read-Only Admin role, with access to all resources:

Assign both the Read-Only Admin as well as the created role above to the user that will be used in connecting the integration.

If attempting to connect the integration as read only, enter the following in the scopes field:

With this configuration, Lumos will not be able to make any changes in Okta directly. This may block further usage of AppStore and automated workflow usage.