Full Guide: Installing the Beyond Identity User Portal

Prev Next

This article provides step-by-step instructions for configuring Beyond Identity User and Admin Portal access via Okta, including SCIM provisioning, SSO integration using OIDC or SAML, and user authentication workflows.


To set up the BI User Portal, follow the steps below.

  1. In the Okta portal, navigate to Applications > Applications > Browse App Catalog.

  2. In the Search window, type Beyond Identity User.

  3. Select the Beyond Identity User Portal app.
    bi user portal.png

  4. Click Add.

  5. Under General Settings, update the following:

    • In the Application Label, type Beyond Identity User Portal.

    • Click Done.

  6. In the Assignment tab, click Assign and select Assign to Groups from the drop-down.

  7. Click Assign for the Beyond Identity group.

  8. In the Sign On tab, update the following fields.

    • Click Edit for settings.

    • Update the Org ID field with Organization Id provided by Beyond Identity team. This is the name of your Beyond Identity tenant.

    • Note the SSO Client ID and Client Secret values, and save these in a secure external document. You will use these values in the next section.

    • Click Save.

  9. In the Provisioning tab, update the following fields.

    • Click Configure API Integration.

    • Click Enable API Integration.

    • Move over to the Beyond Identity Admin Console to generate an API token,

      1. Go to Settings > API Access > click Create Client Credentials

      2. Name the Client Credential, and only select the SCIM values for the allowed scopes:
        2025-04-23 15_45_14-.png

      3. Set the Credential Expiration.

        Note: this value is in seconds.

      4. Click Create Client Credentials

      5. Click on your newly created credential to generate a token for this credential.

      6. Click on Tokens

      7. Click Create token

      8. Name the Token Okta API Token and click create token.

        Note: Click the copy icon and save this token in a secure location, this is the only opportunity you have to see the full token value.

      9. Move back over to the Okta Admin Console, in the API token field, paste the API token you generated in the previous step.

      10. Click Test API Credentials.

      11. Select Import Groups if it is not enabled by default. (This is only available in Okta Production instances and not in Developer or Preview instances.)

      12. After seeing the message, “Beyond Identity User Portal was verified Successfully”, save the configuration. provisioning tab.png

  10. After setting up your API SCIM configuration in the above step, make the following changes in the Provisioning tab.

    • In the Provisioning to App section, click Edit.

    • Click Enable beside

      • Create Users

      • Update User Attributes

      • Deactivate Users

    • Click Save.
      provisioning to app.png

  11. Make the following changes in the Provisioning tab.

    Note: This step only applies to Okta Production instances, not Developer or Preview instances.

    1. In the Integration section, click Edit.

    2. Select Import Groups if it is not enabled by default.

    3. Click Save.
      import groups.png

  1. To sync groups with Beyond Identity:

    • Select the Push Groups tab.

    • Click the Push Groups drop-down and select Find groups by name. This defines which groups are synced with Beyond Identity. Add your Beyond Identity Group to this section and click Save.
      push groups.png

With the above steps completed, verify your user is now populated in the Beyond Identity Admin Console. These should now be populated via SCIM.  

Setup the User Portal Access in Beyond Identity

  1. Log into the Beyond Identity Admin console.

  2. Navigate to Settings > Console Login > User Console SSO Integrations and click Add Active SSO.

  3. Select the drop-down beside Active SSO and choose whether to use OIDC or SAML for the SSO. For this integration, we recommend using OIDC
    2025-04-23 15_58_11-Beyond Identity Admin Console.png

  4. Click Save Changes.

  5. Configure the fields for the SSO type for User Console SSO Integrations and then click Save Changes.

    • OIDC Connection

      OIDC Option

      Specify the following

      Name

      Okta OIDC SSO

      Client ID

      <Use the value copied in the previous section>

      Client Secret

      <Use the value copied in the previous section>

      Issuer

      https://<okta-tenant-id>.okta.com (Provided by the customer as Login URL) (Remember not to have a trailing slash after issuer URL)

      Token Field

      sub

      Token Field Lookup

      external id

      Scopes

      Select all [Alternately select Profile , email] - Optional


      user portal oidc.png

    • SAML Connection

      SAML Option

      Specify the following

      Name

      Okta SAML SSO

      IDP URL

      <SAML SSO service URL>

      IDP Entity ID

      <SAML request URL>

      Name ID Format

      unspecified (unless the IDP requires a different value)

      Subject User Attribute

      Option varies based on the Beyond Identity attribute

      Request Binding

      Binding for the outgoing AuthnRequest

      X509 Signing Certificate

      Upload the public key certificate of the IDP used to verify SAML assertions

 

Setup the Beyond Identity Admin Application in Okta

  1. In the Okta portal, navigate to Applications > Applications > Browse App Catalog.

  2. In the Search window, type Beyond Identity Admin.

  3. Click the Beyond Identity Admin Portal app.

  4. Click Add.
    admin portal.png

  5. In the Assignment tab, assign Admins to this Application.

  6. In the Sign On tab, update the following.

    1. Click Edit for settings.

    2. Update the Org ID field with the Organization ID provided by Beyond Identity.

    3. Note the SSO Client ID and Client Secret fields. You will use them in the following section.

Setup Admin Portal Access in Beyond Identity

  1. In the Beyond Identity Admin console, navigate to Settings > Console Login > Admin Console SSO Integrations.

  2. Click Add Active SSO.

  3. Select the drop-down beside Active SSO and choose whether to use OIDC or SAML for the SSO. For this integration, we recommend using OIDC
    2025-04-23 15_58_11-Beyond Identity Admin Console.png

  4. Click Save Changes.

  5. Configure the fields for the SSO type for Admin console SSO Integrations and then click Save Changes.

    • OIDC Connection

      OIDC Option

      Specify the following

      Name

      Admin Console SSO - Okta

      Client ID

      <Use the value copied in the previous section>

      Client Secret

      <Use the value copied in the previous section>

      Issuer

      https://<okta-tenant-id>.okta.com (Provided by the customer as Login URL) (Remember not to have a trailing slash after issuer URL)

      Token Field

      sub

      Token Field Lookup

      external id

      Scopes

      Select all [Alternately select Profile , email] - Optional


      user portal oidc.png

    • SAML Connection

      SAML Option

      Specify the following

      Name

      Admin Console SSO - SAML

      IDP URL

      <SAML SSO service URL>

      IDP Entity ID

      <SAML request URL>

      Name ID Format

      unspecified (unless the IDP requires a different value)

      Subject User Attribute

      Option varies based on the Beyond Identity attribute

      Request Binding

      Binding for the outgoing AuthnRequest

      X509 Signing Certificate

      Upload the public key certificate of the IDP used to verify SAML assertions

      user portal saml.png

  6. Assign a user to an Admin role so they can access the Beyond Identity Admin console.

    1. Select the Console Access Control tab.

    2. Click on the predefined Super Administrators role.

    3. Click Assign Access role to users and select a user from the drop-down.  assign user to role.png

    4. Click Assign users to role.

      Note: You could also assign user groups to Admin roles. To do so, select the Groups tab for the predeefined admin role, click Assign access role to groups, select a group, and then click Assign groups to role.

      assign group to role.png

  7. After these values are provisioned, the user or a group member assigned to the Super Administrator role should log in and confirm that they have access to the Beyond Identity Admin console through the Okta SSO.

User Authentication (Signing in)

  1. Enrolled users can visit their Okta instance or any application supported by your SSO to sign into their corporate applications.

  2. The Okta application or SSO-supported application will ask the user to enter their username.

  3. Once the username is submitted, a prompt to use or open the Beyond Identity app for authentication will display for the user.

  4. The user should click affirmatively on the prompt to be signed into their application, without the use of a password. The Beyond Identity app along with a success notification will display.

    Note: For iOS devices, some application sign-in processes will ask the user to exit out of the Beyond Identity Authenticator to return to their app after successful authentication.