Create Service Account in Okta to Synchronize Users

This page describes how to create a service account user with minimal permissions for users synchronization.

  • It is always better to use regular admin user for users sync.

  • This procedure should not be used to avoid sync by super admin because application gets only rights that are granted in Okta (Applications → LH → Scopes) so there is no way to get any sensitive rights.

  • This approach makes sense if you want to limit set of users available in LH app or want to use service account instead of real admin user.

  • If a Service Account is used for the Okta integration, we advice to use an email address for the Service Account that is monitored to receive system notifications like broken Service Account integrations.

  • Okta Service Account permissions can be limited via roles (allow Service Account only to read users and not modify users, in this way the integration will be more safe and secure).

Step 1: Create Service Account

  1. In Okta admin panel go to DirectoryPeople

  2. Click Add person:

    1. Fill fields required in your tenant.

    2. Password: Set by admin.

    3. Create secure password.

    4. Ucheck User must change password on first login.

    5. Save.

Step 2: Assign Minimal Legal Hold Role

As described in documentation - grant desired user IPRO Legal Hold - System Administrator role - it will give minimal required access to manage subscription and address book.

Step 3: Create Minimal Okta Role

  1. In Okta admin panel go to Security AdministratorsRoles.

  2. Click Create new role.

    1. Name it (for example “Legal Hold Users sync manager”).

    2. Select View users and their details permission.

    3. Save.

  3. In Okta admin panel go to SecurityAdministratorsResources.

  4. Click Create new resource set.

    1. Add Assignment:

      • Resource type: Users.

      • Group names: Select Constrain to all users if you want all users to be accessible from LH app OR select groups of users to be visible. For groups make sure that these are Okta groups, users from Provisioned groups (like originated from Microsoft Entra ID) may not be visible.

    2. Name it accordingly (for example “All users”).

    3. Save.

Alternative:

  • Super Admin user can be used for accessing all users, however, it will not grant any extra rights unless specified in Okta application scopes.

  • Group admin user can be used to access scope of users.

Step 4: Assign Minimal Okta Role

  1. In Okta admin panel go to SecurityAdministrators Roles.

  2. In desired role row click EditView or Edit Assignments.

  3. Add Assignment:

    1. Admin: Select created user.

    2. Resource set: Select created set.

  4. Save.

Step 5: Users Sync

  1. Login to your subscription with newly created user and click Synchronize users in address book.

  2. Don’t forget to login with this user into the system at least once every 3 months so LH will get a new OpenId Connect refresh token and proceed with background synchronization.