Auto Provisioning Tokens
  • 2 Minutes to read
  • Dark
    Light

Auto Provisioning Tokens

  • Dark
    Light

Article Summary

On the Auto Provisioning Token page system or tenant level administrators can create accounts and tokens to be used with an identity provider to create nVoq accounts through that provider that can sign in using SSO. Tokens can also be deleted on this page.

Account provisioning on this page currently only works with Okta.
Account provisioning is not yet supported with Microsoft Entra ID (formerly Azure AD) or any other identity management service at this time.

Create a New Token

  1. Click on the actions iconAccounts-actions-iconnext to an identity provider on the Identity Providers page and select Auto Provisioning Token.

  2. On the Auto Provisioning Token page, click the Create new token button. Create-new-token-button
    • When a new token is created for the first time a provisioning account with a Generated Administrator Username (near the top of the page) is created. 
      • This non-billable account is visible on the Accounts page at the tenant level.
    • The actual JSON Web Token (JWT) is displayed in an un-editable text area. You will only be able to see this token once. When you close this page (or click the Create New Token button again), it is gone forever. 
      • Tokens automatically expire one year from the date they are created, after which they no longer appear on this page.IdentityProvider-create-new-token-page
    • You can create a maximum of two (2) tokens per provisioning account. The second one allows you to update to a new token before the first one expires and stops working. If you attempt to create a token when two already exist, a red popup notification will appear in the top right of the screen stating, "Could not create token." A notification message (under the bell iconNotifications-iconin the upper-right corner) explains that a token could not be created because "too many provisioning tokens already exist."

  3. Click the Copy token to clipboard icon next to the token to copy it to your computer's clipboard. IdentityProvider-copy-token-to-clipboard

  4. Use the copied token together with the generated administrator username with your identity provider to create nVoq accounts that can be accessed via SSO
    • Using the provisioning account the Okta provider can send SCIM data to the nVoq system.  (The nVoq system does not send SCIM data to Okta.)


Delete a Token

  1. Click on the actions iconAccounts-actions-iconnext to an identity provider on the Identity Providers page and select Auto Provisioning Token.

  2. Click the trash icontrash-iconnext to the token you want to delete.
     
  3. You will be asked to confirm that you want to delete the token. Click Yes, delete Provisioning token to permanently remove the token. IdentityProvider-delete-token-confirmation

  4. For troubleshooting purposes deleted token information remains on the Auto Provisioning Token page (along with the username of the person who deleted it) until the token's expiration date.IdentityProvider-deleted-token-page
    • Only deleted tokens remain in this list; tokens that have expired do not.



What's Next