1. Home
  2. Setup Single Sign On (SSO) and User Provisioning with Okta SCIM

Setup Single Sign On (SSO) and User Provisioning with Okta SCIM


This documentation is subject to Splunk’s Websites Terms and Conditions of Use. Please be advised that using this integration is permitted subject to your obligations, including data privacy obligations, under your agreement with Splunk and Splunk’s Privacy Policy.

This is a beta release and may contain defects or deficiencies. Please use it at your own risk. Splunk disclaims any and all warranties for this feature, including any implied warranties of merchantability, fitness for a particular purpose, and other warranties arising out of course of dealing or usage of trade or by statue or in law.  Splunk does not guarantee that this feature will meet your requirements, will be error-free, accurate, reliable, complete or uninterrupted. This feature is not subject to support, update or upgrade or any other commitments from Splunk under its agreement with you. Splunk is making this feature available for evaluation purposes only and is not obligated to develop the full functionality or include this feature in a future release.

Requirements for the customer

  1. Ensure you have configured the General Settings and any Sign-On Options for the VictorOps app on Okta.
  2. Configuring Single Sign-On and initial activation of Okta provisioning with Splunk On-Call (formerly VictorOps) is currently not a self-service process and requires contacting the Support team. Step 7 in In Okta (initial setup) section below has more details.
  3. You must be a Global Admin for your Splunk On-Call organization.
  4. Review and execute the following task checklist to understand the implications of enabling this integration and the pre-work involved. To perform the following tasks, you can login to Splunk On-Call and export the user list which includes contact methods, team membership, and role information for each user. Only Global Admins can export the user list.
Task to perform before enabling Okta integration   Possible issues if task not performed
1 Ensure every Splunk On-Call user has an email address in their profile that exactly matches the email address of their Okta account. It is not a problem if Splunk On-Call accounts have additional contact methods. Duplicate users
A new Splunk On-Call user will be created with the email address from Okta account as long as the Splunk On-Call seat limit has not been reached for the organization. Splunk On-Call user not linked with Okta.
If a Splunk On-Call user doesn’t have a matching Okta account based on email address, the user will not be linked with Okta.
The user will not be able to login using Okta SSO but can login if non-SSO login is enabled for the Splunk On-Call organization.
2 If a Splunk On-Call user profile has multiple email addresses, ensure they do not map to different Okta user profiles.


Since a Splunk On-Call account can map to only one Okta account, only one of the matching Okta accounts will be linked to Splunk On-Call.
3 More than one Splunk On-Call user has the same Okta email address. Okta will fail to provision these users and an error message will be indicated in Okta.
4 Ensure Okta will not add more users than the number of Splunk On-Call user seats purchased. Splunk On-Call will successfully process all Okta user provisioning calls even if it results in exceeding the purchased seat limit in Splunk On-Call. If you do not want this to be the default behavior, please inform our Support team so we can configure your Splunk On-Call account to not exceed the purchased seat limit. An error will be returned to Okta in this scenario.


Deprovisioning a user will permanently delete the following attributes from Splunk On-Call for that user, and the user will not be able to login.
1 – Any Splunk On-Call user contact methods not present in Okta
2 – User mobile device registration for push notifications
3 – User paging policies
4 – User team membership
5 – User on-call rotation membership
6 – Removes the user from any Escalation Policies and Scheduled Overrides for On-call.
Reassigning a previously deprovisioned user will not recover the above attributes in Splunk On-Call.


Single Sign-on using SAML and SCIM 2.0 user provisioning.

The following provisioning features are supported:

  • Push New Users
    • New users created through Okta will also be created in the third party application.
  • Push User Deactivation
    • Deactivating the user or disabling the user’s access to the application through Okta will deactivate the user in the third party application.
    • Note: For this application, deactivating a user means removing the user from your Splunk On-Call organization
      • That user will no longer be able to login to Splunk On-Call
      • That user will no longer be present in any on-call rotations
  • Reactivate Users
    • User accounts can be reactivated in the application. The reactivated user will require certain manual reconfiguration in Splunk On-Call.

In Okta (initial setup)

1) From the Okta User Homepage, select Admin.

2) Selecting Admin will bring you to the Okta Dashboard. From the Okta Admin Dashboard, click Applications and select Add Application.

3) In the search bar, search for “VictorOps (Beta)“. Click on “VictorOps (Beta) in results to open.

4) Once the page loads, click on “Add” button.

The Application label should auto-populate with the name VictorOps (Beta) but please feel free to rename this label and click Next.

5) In the page that loads, click on SAML 2.0 radio button.

6) You will need Splunk On-Call (formerly VictorOps) organization identifier for this step. To find the identifier, login to your Splunk On-Call account and view the URL in the browser address bar. In the example screenshot below, “my-company” is the organization identifier.orgslug example

  • In the Default RelayState text box add:


  • In the field Organization identifier enter just the org-identifier
  • Select Application username format to: Email (this is the only option currently supported)

7) Copy the URL linked to the Identity Provider metadata link to your clipboard, and click Done.

8) Please send an email to spoc-support@splunk.com with subject “Okta setup request” and ask to configure Okta SSO for your Splunk On-Call organization. Paste the URL link you copied from the Identity Provider metadata from step 7 above in the email.

Please wait for a response from Splunk On-Call Support team before proceeding with instructions below.

Get Bearer Token from Splunk On-Call

Please make sure Splunk On-Call Support team has configured SSO before proceeding with following instructions.

1) Once Splunk On-Call support team configures SSO for your account, login as Global Admin to Splunk On-Call.

2) Navigate to Integrations >> API. If API Access is disabled, click on Activate API Access. More details on API access can be found here.

3) Click on Integrations >> 3rd Party Integrations. Search for “Okta” in the search bar and click on the resulting tile.

4) In the result page, click on Enable Integration which will generate a bearer token as shown below. If Okta is already enabled and you wish to generate a new token, click Revoke Token and reenable the integration.

5) Copy the token and save it in a temporary place as you will need it in subsequent steps.

In Okta (provisioning setup)

Please make sure Splunk On-Call Support team has configured SSO before proceeding with following instructions.

1) Go to VictorOps (Beta) application in Okta and click on Provisioning tab and click Configure API Integration.

2) Select Enable API integration and paste the API token copied from Splunk On-Call (step 5 from In Splunk On-Call section above). Click Test API Credentials to verify the API communication is working correctly between Okta and Splunk On-Call. Click Save.

3) Click on To App under Provisioning tab. Click Edit and select Enable for Create Users and Deactivate Users. Click Save.

You can now assign people or groups to the app (if needed) and finish the application setup. Users will be automatically added and removed from Splunk On-Call based on your setup above. The provisioned users can use the Okta application (chiclet) to log into Splunk On-Call using SSO.

User Provisioning Process

This section describes how Okta user accounts are linked to a Splunk On-Call user account when the Okta–Splunk On-Call integration is enabled.

User profiles are connected between the two systems as follows:

  1. Okta sends a new user provisioning request to Splunk On-Call
  2. Splunk On-Call retrieves the primary email attribute for the user from the request
  3. Splunk On-Call searches for matching user profile containing the same email address
    1. If no users are found, a new user is created in Splunk On-Call.
    2. If exactly one user is found, the Okta user is linked to the Splunk On-Call user.
    3. If more than one user is found, an error is returned to Okta and the provisioning request fails. To fix this error, ensure the email address in Okta profile exists in only one user profile in Splunk On-Call.
    4. If a user is found but the accounts were already linked previously, an error is returned. Please reach out to Splunk On-Call Support to resolve this.

User Deprovisioning Process

Okta requests to deactivate user from Splunk On-Call are handled as follows:

User to be removed is part of On-call rotations, Escalation Policies or user is overriding another user’s on-call in Scheduled Overrides

1. Find all the teams the user is part of or teams in which the user took scheduled overrides or manual on-call.
2. For each team:

1. If the user is not part of on-call rotation or escalation policies in the team, then user is removed from the team. Otherwise proceed to next step.
2. Look for an admin in the team in this order: Team Admin, Alert Admin, Global Admin, Non-admin.
3. Users who have mobile device registered for push notification or verified phone number in their profile are given preference.
4. If there are more than one user resulting from above two steps, then pick the first user after sorting on username A->Z.
5. Place the resulting user as replacement for removed user in on-call rotations and escalation policies.
6. The replacement user is notified by email. In the email they get a list of rotations, escalation policies that were changed and also are told if any overrides changed.

3. If the user to be removed is the only member in a team, then an error message is returned to Okta and the remove-user operation is not completed in Splunk On-Call.

User manually took on-call from another user and is currently on-call

Same process as above.

User to be removed is the only Global Admin in the Splunk On-Call org

This operation is not supported and an error is sent back to Okta.

After the above checks and replacements are complete, the user is removed from their org in Splunk On-Call and can no longer login.


  • Test API Credentials fails in Okta
    • Ensure there are no leading or trailing spaces in the token copied from Splunk On-Call. If you continue to see this error, please contact the Splunk On-Call support team.
  • Updates to user profile attributes in Okta are not reflected in Splunk On-Call
    • Updates to user profile attributes in Splunk On-Call, including username, are currently not supported. If updating a certain user’s profile is really important, a workaround is to delete the user from Okta. And then create a new user in Okta and assign to the Splunk On-Call application. This will result in a new user being created in Splunk On-Call with the desired user profile attributes.
  • Error: This Okta user is already linked to a different user in Splunk On-Call with the email address
    • You may receive this error if the Okta user is already linked to a user in Splunk On-Call. Please contact Splunk On-Call support.
  • Error: More than one Splunk On-Call user was found with the Okta user email address
    • Ensure only one user exists in the Splunk On-Call organization with the given email address.
  • Error: This user can not be removed from Splunk On-Call because they are the last Splunk On-Call Global Administrator for this organization
    • At least one Global Administrator is required to be present in an active Splunk On-Call account. Please login to Splunk On-Call and assign the Global Admin role to another user and retry this operation.
  • Error: This user could not be removed from Splunk On-Call because they are part of an on-call rotation or escalation policies and a replacement user could not be found
    • Please login to Splunk On-Call and remove dependent on-call rotations, escalation policies or teams and retry this operation.
  • Error: Another Okta user is already linked to the user in Splunk On-Call with this email address
      • Ensure only one Okta user exists with the given email address.
      • Or check if the matching Splunk On-Call user has two email addresses, each pointing to a different Okta user. This type of mapping should be avoided.
Updated on August 12, 2021

Was this article helpful?