Getting Started with ALTR & Snowflake
Configure ALTR's Snowflake Service User
Connect Snowflake Databases
Connect Columns to ALTR
Creating Policy & Manage Data
Configuring SCIM for Okta
Classification
Analytics
Column Access Policies
Views
Thresholds
Row Access Policy
Audit Logs
Settings
Tokenization
Tag-Based Data Masking
Tokenization API
Management API
ALTR Driver JDBC Installation
ALTR Driver ODBC Installation
Configure Tableau to Gain User Level Observability
Integrating ALTR Notifications with AWS S3
TDS Proxy Installation
CDM Installation
Custom Masking and Extensibility Functions
Bring Your Own Key for Tokenization
Open-Source Integrations
System for Cross-domain Identity Management (SCIM) is an open specification to manage identities across a wide number of software applications by easily creating, editing and managing accounts through a single identify provider (IdP) such as Okta. Setting up SCIM for your organization will help to automate your individual users' access to ALTR. Our first release of SCIM is tested to work with Okta.
You must meet the following prerequisites:
Once your organization has enabled SSO, the option to activate SCIM will become available for ALTR Administrators. This entails indicating which IdP you are using and generating the URL and token in ALTR for the SCIM endpoints.
Once the URL and token are generated, then you must provide that information to Okta so that it can make API calls to ALTR to manage administrators. You should only generate the URL and token if you intend to activate SCIM. Generating the URL and token activates SCIM in ALTR and cannot be undone.
Follow the steps below to provision users with SCIM. It's a three-stage process.
NOTE: Users are created as a 'SUPER ADMINISTRATOR' by default.
Find the ALTR app for your organization in Okta and select SCIM
Generate the bearer token
Note: Although SCIM supports groups of users, ALTR only supports individual users.
As stated above, users are created as a 'SUPER ADMINISTRATOR' by default; therefore, if you prefer to assign someone as an 'Administrator' instead, then you'll need to go into the Add Attribute section of Okta and add an 'ALTR Admin Level' value for the user's profile. See figure 7b.
If you choose to deactivate SCIM, then reach out to support@altr.com.
NOTE: When SCIM is deactivated, ALTR will maintain the existing administrator configuration at the time it happened. That is, the same users that have ALTR accounts while SCIM was enabled will continue to have accounts when SCIM is disabled. Disabling SCIM will also re-enable the non-SCIM routes to manage administrators, so that users can once again manually create, edit, or deactivate admins directly in ALTR.
SCIM Standards
Q. What protocol does ALTR use to perform SCIM?
A. SCIM version 2.0
Disabled SCIM
Q. What happens if SCIM is manually disabled for an organization?
A. ALTR will retain all administrator information from the time SCIM was disabled. Users will once again be able to manage administrators directly in ALTR
IdPs that ALTR supports to work with SCIM
Q. Which SSO/SCIM Providers does ALTR support?
A. Our first release of SCIM is tested to work with Okta.
Usernames and Org IDs
Q. What happens if a user forgets their Org ID or Username?
A. Users will be able to retrieve a list of all of their organizations and usernames in an ALTR environment by providing their email address.
Q. Does ALTR support groups of users?
A. Although SCIM supports groups of users, ALTR only supports individuals.
Testing Configuration Result
Q. What should I do if my testing configuration isn't successful?
A.Review your forms to make sure that you've filled out everything correctly. If you have and still don't get a successful test result, then email support@altr.com