Use the System for Cross-domain Identity Management (SCIM) protocol with Alibaba Cloud IDaaS OAuth application authorization to synchronize users and groups from Okta to Alibaba Cloud IDaaS. This keeps identity data in sync during cloud migration without manual account maintenance.
Prerequisites
Before you begin, ensure that you have:
Administrator permissions for Alibaba Cloud IDaaS and super administrator permissions for your Okta instance
An Okta instance with SCIM 2.0 support enabled
An existing EIAM (Employee Identity and Access Management) instance in Alibaba Cloud IDaaS
How it works
The sync flow runs in four stages:
Configure an IDaaS application to expose a SCIM endpoint and generate a Bearer Token.
Create or reuse an Okta application that supports SAML 2.0 single sign-on.
Point Okta's SCIM connector at the IDaaS endpoint using the Bearer Token, then define which users and groups to push.
Verify that accounts and groups appear in IDaaS with a source of SCIM Import.
Step 1: Configure SCIM synchronization in your IDaaS application
Log on to the Alibaba Cloud IDaaS console. In the left navigation pane, click EIAM. On the IDaaS tab, find the target instance and click Console in the Actions column.
Navigate to Application Management > Applications and open the details page for a Standard Protocols or Custom Applications application. To create one, see Create an application.
Configure the sync settings. For details, see Synchronize accounts between IDaaS and applications.
ImportantMake sure IDaaS API is enabled in the application.

Collect the two values you will need in Step 3.
Value Where to find it Bearer Token Provisioning > Synchronize Application to IDaaS > next to Bearer Token, click View, then copy and save the token SCIM Base URL Provisioning > Synchronize Application to IDaaS > copy the value from the SCIM Base URL field In the left navigation pane, click Sign-In. Under Password Policy > Complexity Rules, set the IDaaS password policy.
Step 2: Create an application in Okta
If you already have an Okta application that supports SAML 2.0 single sign-on, skip to Step 3.
To create a new one, follow Create an application that supports SAML SSO in Okta, then continue to Step 3.
Step 3: Configure SCIM integration in Okta
Enable SCIM
On the Okta application details page, go to the General tab. In App Settings, click Edit, set Provisioning to SCIM, and click Save.

Configure the SCIM connection
On the Provisioning tab, in the SCIM Connection section, click Edit and set the following parameters.
Parameter Value SCIM connector base URL The SCIM Base URL from Step 1 Unique identifier field for users userNameSupported provisioning actions Select Push New Users, Push Profile Updates, and Push Groups Authentication Mode HTTP Header Authorization The Bearer Token from Step 1 Click Test Connector Configuration. The message Connector Configured successfully confirms a working connection.
Click Save.
Configure the user sync policy
Go to Provisioning > To App and click Edit next to Provisioning to App.
Enable Create Users, Update User Attributes, and Deactivate Users.
Configure Sync Password based on your requirements.
NoteFor password sync to succeed, the Okta password policy must be at least as strict as the IDaaS password policy. For example, if IDaaS requires at least 8 characters including a special character but Okta only requires 6 characters, passwords that don't meet the IDaaS requirements will fail to sync. To set the Okta password policy, go to Security > Authenticators in the Okta Admin Console, find the Password row under Setup, and click Actions > Edit. To set the IDaaS password policy, go to Sign-In > Password Policy > Complexity Rules in the IDaaS console.
Setting Behavior Disabled Okta includes a passwordfield when creating the user via SCIM, but sends a randomly generated placeholder — not the user's actual password. This satisfies the SCIM protocol's field requirement but has no effect on login credentials in IDaaS. Users must set their actual password through a separate reset or password policy. For details, see the Okta SCIM 2.0 User Creation and Password Synchronization Guide.Enabled — Sync a randomly generated password Okta generates a random password for each user and syncs it to IDaaS. Enabled — Sync Okta Password Syncs the user's Okta login password to IDaaS, so the user logs in with the same password in both systems. Click Save.
Configure user attribute mapping
Attribute mapping controls which Okta user data gets pushed to IDaaS and how it maps to IDaaS fields.
Synchronize basic attributes
In the Attribute Mappings section on the Provisioning page, click the
icon on the far right to remove any attribute mappings you don't need. Keep only the mappings shown in the following figure.

Synchronize custom attributes (optional)
The following example shows how to sync the postalAddress field from Okta to a custom Extended Fields entry in IDaaS named User Address.
1. Add an extended field in IDaaS.
In the IDaaS console, go to Account > Field Management > Extended Fields and click Create Field.
Fill in the field details.
Field Example value Field Display Name User AddressField ID user_addressField Type Input box On the IDaaS application details page, go to Provisioning > Synchronize Application to IDaaS > Show Advanced Settings and configure the following.
Setting Value Custom Field Namespace urn:ietf:params:scim:schemas:extension:customfield:2.0:UserSync Target Field User Address (user_address)Click Save.
2. Add an attribute in Okta.
On the Okta Profile Editor page, go to the Attributes section and click Add Attribute.
Fill in the attribute details.
Field Example value Display name User AddressVariable name user_address— must match the Field ID in IDaaSData type string— must match the IDaaS field typeExternal name user_address— must match the Field ID in IDaaSExternal namespace urn:ietf:params:scim:schemas:extension:customfield:2.0:User— must match the Custom Field Namespace in IDaaSClick Save.
In the Attributes section, click Mappings. From the panel, select Okta User To [Target Application Name].
At the bottom of the list on the right, find the target attribute (for example,
user_address). From the drop-down list on the left, select the Okta field to map from (for example,user.postalAddress).Click Save Mappings, then click Apply updates.
Synchronize users and groups
Synchronize users
On the Okta application details page, go to the Assignments tab and click Assign > Assign to People.
Find the user to sync and click Assign in the corresponding row.
On the Assign [Target Application Name] To People page, adjust attributes as needed, click Save and Go Back, then click Done.
Synchronize groups
On the Okta application details page, go to the Push Groups tab and click Push Groups > Find Groups By Name.
Enter the group name, select the target group, and click Save. When the Push Status changes from Pushing to Active, the group is synced.
Step 4: Verify the synchronization
Log on to the Alibaba Cloud IDaaS console and click Console for the target instance.
In the left navigation pane, go to Account > Accounts and Orgs. Synced users appear in the Account list with Source set to SCIM Import.
NoteIf you configured custom Extended Fields, click a user's Username to open the User Details page and check the fields under Account Information > Extended Field.
Go to Account > Group. Synced groups appear in the Group list with Source set to SCIM Import.
FAQ
What type of Okta application should I use for SCIM sync?
Select SAML 2.0 when creating the Okta application. This type supports both SAML 2.0 single sign-on and user/group synchronization over SCIM.
How do I trigger Okta user synchronization?
There are three ways sync can happen:
Automatic: Sync starts when a user is assigned to the IDaaS application in Okta.
Manual push: Go to the Push Groups tab, select a group, and click Save. The sync starts immediately and the status changes from Pushing to Active.
Event-driven: When a user's profile changes — such as being added, modified, or deleted — Okta triggers sync automatically based on the Push Profile Updates setting.
Can I delete synced users or groups? What happens if I remove a user's app authorization?
Deleting users or groups in Okta:
If you delete a user or group in Okta, the change syncs to IDaaS according to your configuration. Note that Resource Access Management (RAM) users don't have an enabled or disabled status, so users marked as inactive in Okta are not disabled or deleted in RAM. IDaaS does not support syncing the inactive status from Okta.
Removing app authorization:
If you remove a user's application authorization in Okta, sync stops for that user. The user record in IDaaS is not deleted — it is marked as unauthorized. An administrator must manually remove the user's data (account information, group memberships) from IDaaS.