Using SCIM with OneLogin and Workspace ONE Access

I’ve had quite a few requests lately for assistance setting up SCIM capabilities with OneLogin and Workspace ONE.

In full disclosure, I’ve set this up in my lab but I’ve not done full end to end testing of all CRUD capabilities.

The one obvious difference in the setup and configuration with OneLogin over some of our other partners is the ability to support the Authorization Code Grant Flow.  Big Kudos to the OneLogin team.

Lets look at the high level steps:

  1. Create a directory instance in Workspace ONE Access
  2. Create a OneLogin Remote App Access Client.
  3. Configure VMware Workspace ONE application in OneLogin.

Create Directory Instance in Workspace ONE Access

In order to create a directory instance in Workspace ONE Access, we’ll need to use the API because the type of directory required for this integration can not currently be done using the Admin Console. In the following steps we’ll use Postman to run the necessary API calls.

  1. We will need an Oauth Token in order to use the API.  Please see my other blog on your options on getting an OAuth Token
  2. Open a new tab in Postman, Select POST and the method.
  3. For the URL, enter: https://TENANTURL/SAAS/jersey/manager/api/connectormanagement/directoryconfigs
    Replace the Tenant URL with your URL
    https://dsas.vmwareidentity.com/SAAS/jersey/manager/api/connectormanagement/directoryconfigs
  4. In the Authorization Tab, Select either BEARER Token or OAuth 2.0 depending on the option you chose in Step 1 to get a token. Select or Paste your Token.
  5. In the Headers Tab, Set the Content-Type to “application/vnd.vmware.horizon.manager.connector.management.directory.other+json”
  6. Click on the Body Tab
  7. Use the following as a sample and Click Send:
    1. {  
    2. “type”:”OTHER_DIRECTORY”,    
    3. “domains”:[“onelogin.com”],      
    4. “name”:”OneLogin Directory”   
    5. }  
  8. In the Workspace ONE Admin Console, verify that the directory is created and is associated with the correct domain.

Create a OneLogin Remote App Access Client

We will now create a OneLogin Application in Workspace ONE Access which will be used by OneLogin to create/update/delete users in Workspace ONE.

  1. In the Workspace ONE Admin Console, go to Catalog -> Webapps
  2. Click New (Top Left)
  3. Enter a Name ie. OneLogin SCIM
  1. Click Next
  2. On the configuration page, you will need to enter:
    Authentication Type: Open ID Connect
    Target URL: Enter your OneLogin Tenant ie. https://tenant.onelogin.com
    Redirect URL:https://admin.us.onelogin.com/provisioning/oauth_redirect_uri
    Client ID: Enter a value for the Client ID: ie. OneLoginSCIM
    Client Secret: Enter a value for the Client Secret ie. Test12345
    Show in User Portal: NO

  1. Click Next
  2. Click Next for Access Policy
  3. Click Save
  4. Assign the application to your System Domain user

This wizard will create a new remote app access client that will be used by OneLogin. You can see the client which was created by going to Catalog -> Settings -> Remote App Access.

Warning: Do NOT edit the scopes. You will not be able to re-add the Admin scope if you do.

Configure VMware Workspace ONE application in OneLogin.

  1. In the OneLogin admin console, search for “VMware Workspace ONE” under Applications
  1. Select and Click Save
  2. Click on Configuration on the left menu
  3. Under SCIM Base URL, enter: https://%5Btenant%5D.vmwareidentity.com/SAAS/jersey/manager/api/scim
    ie. https://dsas.vmwareidentity.com/SAAS/jersey/manager/api/scim
  4. Under VMware Site, enter your tenant URL. This will be used as the Oauth Authorization Server URL.
    ie. https://dsas.vmwareidentity.com
  5. Under Client ID, enter the client ID you used in the previous step
  6. Under Client Secret, enter the secret you used in the previous step.
  1. Click Save
    Please don’t forget to hit SAVE!
  2. Go back to the Configuration Tab
    Before you Continue, you need to make sure your Policy in Workspace ONE Access will allow you to authenticate using System Domain credentials without using the backdoor.  You will need a policy similar to below. The Password (Local Directory) needs to be a fallback.
  1. Under API Connection, Click Authenticate
  1. In the pop up, click VMware Workspace ONE
  1. When prompted to Authenticate, Select System Domain
  1. Enter your Credentials
  2. You should be returned back to the One Login Portal with a Successful Authorization
  1. Click on the Parameters Tab
  2. We will need to map the attributes appropriately that will be sent to Workspace ONE.
    In order to map the attributes correctly, we will need to understand how users are created in in OneLogin. Take a look at your users to ensure all the required attributes are set for all users that will be provisioned to Workspace ONE Access.  Attributes such as Username, External ID and User Principal Name are typically set if you have an external directory server. If you are creating users directly in OneLogin without a directory server you will need to select different attribute mappings.
  3. Map the attributes appropriately:
    Distinguished Name: Distinguished Name
    Email Address: Email
    External ID: If ALL users are created in OneLogin from a directory server, select ExternalID
    If some users are created locally in OneLogin, select Internal ID.
    First Name: First Name
    Last Name: Last Name
    Name ID: Email
    SCIM Username: If ALL users are created in OneLogin from a directory server, select Username. If some users are created locally in OneLogin (without a username) , select Email.
    User Domain: Enter value used as the domain when creating the directory in Workspace ONE Access
    User PrincipleName: If ALL users are created in OneLogin from a directory server, select User Principal Name  If some users are created locally in OneLogin, select Email
  4. Click Save
  5. Click Provisioning on the left menu, and enable the Provisioning Checkbox.
  6. Click Save
  7. Assign a user the application and verify it successfully provisions

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s