Configure Just-in-time provisioning

Supported in:

This document explains how to configure Just-in-time (JIT) provisioning for Okta users and Azure users.

With JIT enabled, Google Security Operations SOAR automatically creates the user after a successful SAML sign-in from the configured identity provider (IdP), such as Okta or Google Workspace.

Define JIT provisioning for Okta users

  1. In Google SecOps SOAR, go to Settings > Advanced > External Authentication.
  2. Select Okta and enter the required parameters.
  3. Select the JIT provisioning checkbox to display the mapping fields.
  4. In Okta > Directory > Profile Editor and see how each field is written and then copy that into the field name in the Google Security Operations SOAR platform.
  5. Confirm the fields are are identical in the Google Security Operations SOAR platform and in Okta, and then save.

Define JIT provisioning for Azure users

  1. In Google SecOps SOAR, go to Settings > Advanced > External Authentication.
  2. Select Azure and enter the required parameters.
  3. Select the JIT provisioning checkbox to display the mapping fields, then use the following standard claim URIs:
    • First Name Attribute: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/givenname
    • Last Name Attribute: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/surname
    • User Name Attribute: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
    • Email Attribute: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name. The Email Attribute can also sometimes be seen as http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress

Need more help? Get answers from Community members and Google SecOps professionals.