Set Up SSO and SCIM user provisioning with Okta
You'll need workspace Admin or Owner permissions to configure SSO settings |
Learning Objective
By the end of this tutorial, you'll know how to configure Single Sign-On (SSO) and automated user provisioning (SCIM) between Okta and Claap so your team logs in with company credentials and user access stays in sync automatically.
Why this matters
Managing Claap access manually inviting new hires, suspending leavers, updating roles creates administrative overhead and security gaps. Connecting Okta to Claap through SSO and SCIM eliminates that work: access is granted the moment someone joins Okta and revoked the moment they leave, with no action required in Claap.
Prerequisites
You should already have:
Admin access to your Claap workspace : you'll need workspace Admin or Owner permissions to configure SSO settings
Admin access to Okta : your IT administrator needs permissions to create and configure applications in Okta
SSO and SCIM enabled on your Claap plan : contact your Claap account manager to confirm these features are active for your workspace before starting
Verify Your Company Domain in Claap
Domain verification proves you own the email domain(s) your team uses. Claap requires this before SSO can be enabled, to ensure only users with verified company email addresses can access your workspace through SSO.
Step 1: Open your SSO settings in Claap
Go to [Settings] > [Security] > [Single Sign-On].
This is where domain verification and all SSO configuration lives.
Step 2: Add your company domain
Enter your company's email domain (for example, company.com) and click [Add Domain].
You can add multiple domains for example, a parent company and a subsidiary. Each domain must be verified separately.
Step 3: Add the DNS TXT record to your domain
Claap will display a TXT record value. Add this TXT record to your domain's DNS settings through your DNS provider (for example, Cloudflare, Route 53, or GoDaddy).
DNS changes can take up to 48 hours to propagate. Once propagation is complete, return to [Settings] > [Security] > [Single Sign-On] and click [Verify Domain].
Verify: The domain status in [Settings] > [Security] > [Single Sign-On] should change to "Verified."
Create and Configure the Claap App in Okta
With your domain verified in Claap, your IT administrator sets up the Claap application in Okta and links the two systems. This phase requires coordination between the Claap workspace Admin and the Okta administrator.
Step 4: Create the Claap application in Okta
Your IT administrator opens the Okta Admin console and searches the app catalog for Claap. Add the Claap application to your Okta organization.
Step 5: Share Okta configuration details with Claap
Your IT administrator provides the Okta SSO configuration details (Identity Provider SSO URL, Issuer, and X.509 certificate) to your Claap account manager or support team.
Claap uses these details to complete the connection on the Claap side. Your account manager will confirm when the configuration is active.
Step 6: Configure user groups and role assignments in Okta
In Okta, assign users to groups that map to Claap roles and licenses. The available mappings are:
Okta Group Maps To | Claap Role | Claap License |
Role groups | Member or Admin | β |
License groups | β | Basic, Pro, or Business |
When a user belongs to multiple groups, Claap assigns the highest-level role and license across all groups.
Verify: Assign a test user to the Claap app in Okta and confirm the user appears in your Claap workspace under [Settings] > [Members].
Phase 3: Enable SCIM for Automatic User Provisioning
SCIM (System for Cross-domain Identity Management) keeps user accounts synchronized between Okta and Claap automatically. Enabling SCIM changes how user management works in your workspace review the changes below before activating.
Step 7: Activate SCIM provisioning
Work with your Claap account manager to enable SCIM for your workspace. Once active, Okta becomes the source of truth for user provisioning.
The following table shows what changes when SCIM is enabled:
Action | Without SCIM | With SCIM |
Add workspace members | Manual invitations | Automatic via Okta |
Remove workspace members | Manual suspension | Automatic via Okta |
Change user roles | Admin changes in Claap | Managed via Okta groups |
Change user licenses | Admin changes in Claap | Managed via Okta groups |
Invite guests | Available | Still available |
Workspace invitation link | Available | Disabled |
Additional SCIM behaviors to be aware of:
Workspace Owners retain full control and are not affected by SCIM
Guests (external collaborators) can still be invited and managed manually in Claap
Users in a SCIM-managed workspace cannot rename their own accounts
Step 8: Match existing users to Okta accounts
When you activate SCIM, Claap matches existing workspace members to their Okta accounts by email address. Any user not found in Okta will be suspended automatically.
Review your existing member list in [Settings] > [Members] before enabling SCIM to identify any users who may not have matching Okta accounts.

