Fleet logo
Menu An icon indicating that interacting with this button will open the navigation menu.
Fleet logo An 'X' icon indicating that this can be interacted with to close the navigation menu.
Multi platform
Device management   (+ MDM) Orchestration   (+ monitoring) Software management   (+ CVEs) Integrations

Docs
Stories
News Ask around Share your story COMPANY
The handbook What people are saying

Pricing Schedule a demo
Multi platform
Device management + MDM Orchestration + monitoring Software management + CVEs, usage, app library Integrations
Docs
Stories
News Ask around Schedule a demo Share your story COMPANY The handbook What people are saying
Pricing Try it yourself
{{categoryFriendlyName}}/
{{thisPage.meta.articleTitle}}
search

Foreign vitals: map IdP users to hosts

{{articleSubtitle}}

| The author's GitHub profile picture

Marko Lisica

Share this article on Hacker News Share this article on LinkedIn Share this article on Twitter

On this page

{{topic.title}}
Docs Docs REST API REST API Guides Guides Talk to an engineer Talk to an engineer
Suggest an editSuggest an edit

Try it out

See what Fleet can do

Start now
macOS Windows Linux

Foreign vitals: map IdP users to hosts

{{articleSubtitle}}

| The author's GitHub profile picture

Marko Lisica

Foreign vitals: map IdP users to hosts

Import users from IdP to Fleet

Available in Fleet Premium.

To add IdP host vitals, like the end user's groups and full name, follow steps for your IdP.

Fleet currently supports Okta. Microsoft Active Directory (AD) / Entra ID, Google Workspace, and authentik, more are coming soon.

Okta

To map users from Okta to hosts in Fleet, do the following steps:

  • Create application in Okta
  • Connect Okta to Fleet
  • Map users and groups to hosts in Fleet

Step 1: Create application in Okta

  1. Head to Okta admin dashboard.
  2. In the main menu, select Applications > Applications, then select Create App Integration.
  3. Select SAML 2.0 option and select Next.
  4. On the General Settings page, add a friendly App name (e.g Fleet SCIM), and select Next.
  5. On the SAML Settings page, add any URL to the Single sign-on URL and Audience URI (SP Entity ID) fields, and select Next.
    An icon indicating that this section has important information

    Okta requires us to setup SAML settings in order to setup a SCIM integration. Since we don't need SAML right now, you can set the URL to anything like "example.fleetdm.com".

  6. On the Feedback page, provide feedback if you want, and select Finish.
  7. Select the General tab in your newly created app and then select Edit in App Settings.
  8. For Provisioning, select SCIM and select Save.

Step 2: Connect Okta to Fleet

  1. Select the Provisioning tab and then, in SCIM Connection, select Edit.
  2. For the SCIM connector base URL, enter https://<your_fleet_server_url>/api/v1/fleet/scim.
  3. For the Unique identifier field for users, enter userName.
  4. For the Supported provisioning actions, select Push New Users, Push Profile Updates, and Push Groups.
  5. For the Authentication Mode, select HTTP Header.
  6. Create a Fleet API-only user with maintainer permissions and copy API token for that user (learn how here). Paste your API token in Okta's Authorization field.
  7. Select the Test Connector Configuration button. You should see success message in Okta.
  8. In Fleet, head to Settings > Integrations > Identity provider (IdP) and verify that Fleet successfully received the request from IdP.
  9. Back in Okta, select Save.
  10. Under the Provisioning tab, select To App and then select Edit in the Provisioning to App section. Enable Create Users, Update User Attributes, Deactivate Users, and then select Save.
  11. On the same page, make sure that givenName and familyName have Okta value assigned to it. Currently, Fleet requires the userName, givenName, and familyName SCIM attributes. Delete the rest of the attributes. Okta SCIM attributes mapping

Step 3: Map users and groups to hosts in Fleet

To send users and groups information to Fleet, you have to assign them to your new SCIM app.

  1. In OKta's main menu Directory > Groups and then select Add group. Name it "Fleet human-device mapping".
  2. On the same page, select the Rules tab. Create a rule that will assign users to your "Fleet human-device mapping" group. Okta group rule
  3. In the main menu, select Applications > Applications and select your new SCIM app. Then, select the Assignments tab.
  4. Select Assign > Assign to Groups and then select Assign next to the "Fleet human-device mapping" group. Then, select Done. Now all users that you assigned to the "Fleet human-device mapping" group will be provisioned to Fleet.
  5. On the same page, select Push Groups tab. Then, select Push Groups > Find groups by name and add all groups that you assigned to "Fleet human-device mapping" group previously (make sure that Push group memberships immediately is selected). All groups will be provisioned in Fleet, and Fleet will map those groups to users.

Verify connection

After following steps above, you should be able to see latest requests from your IdP to Fleet if you navigate to Settings > Integrations > Identity Provider (IdP).

To verify that user information is added to a host, go to the host that has IdP username assigned, and verify that Full name (IdP) and Groups (IdP) are populated correctly.

An icon indicating that this section has important information

Currently, the IdP username is only supported on macOS hosts. It's collected once, during automatic enrollment (DEP), only if the end user authenticates with the IdP and the DEP profile has await_device_configured set to true (default in the automatic enrollment profile).

Troubleshooting

If you find that information from IdP (e.g full name or groups) is missing on the host, and host has IdP username assigned to it, follow steps below to resolve.

  1. Please first go to Okta, select Directory > People, find user that is missing information and make sure that it has all fields required by Fleet (username, first name, and last name).
  2. If all required fields are present, then go to Applications > Applications > fleet_scim_application > Provisioning > To App, then scroll on the bottom of the page and make sure that userName, givenName, and familyName has value assigned to it.
  3. Otherwise make sure that all settings from instructions above were set correctly.
Fleet logo
Multi platform Device management Orchestration Software management Integrations Pricing
Documentation Support Docs API Release notes Get your license
Company About News Jobs Logos/artwork Why open source?
ISO 27001 coming soon a small checkmarkSOC2 Type 2 Creative Commons Licence CC BY-SA 4.0
© 2025 Fleet Inc. Privacy
Slack logo GitHub logo LinkedIn logo X (Twitter) logo Youtube logo Mastadon logo
Tried Fleet yet?

Get started with Fleet

Start
continue
×