Opti ID provides multiple options for managing user identity and permissions so that you can choose the best fit for your organization.
- Local login – Invited users set up Opti ID-specific accounts. You manage user identity and permissions within Opti ID.
- SSO without SCIM – Invited users log in to Opti ID through an Opti ID single sign-on (SSO) app that you add to your identity provider's (IdP's) app portal. See Overview of configuring your own SSO for Opti ID. You manage user permissions within Opti ID.
- SSO with SCIM – Manage user identity and permissions within your IdP and automate the information between your IdP and Opti ID. See Overview of SCIM provisioning for Opti ID.
Skip to the corresponding section for the configuration you want to implement.
For step-by-step instructions on configuring Opti ID for CMS (SaaS) or CMS 12, refer to one of the following articles:
Option 1: Configure local login
Local login sets up Opti ID-specific accounts for invited users. You manage user identity and permissions within Opti ID.
- Complete the initial technical contact login. This is the person who logs into Opti ID first and configures it for the rest of your organization. Contact your Customer Success Manager (CSM) if you do not know who the technical contact is. You can change the technical contact later.
- (Optional) Brand your login page.
- Review the local user password policy and how to reset your password.
- (Optional) Configure multi-factor authentication (MFA).
- Review the system roles for your Optimizely products. If you want to personalize permission levels, create custom roles.
- Create groups to simplify the process of giving multiple users the same level of access.
- Invite users, assigning them to roles or groups so that they have the appropriate access to your Optimizely products.
Option 2: Configure SSO without SCIM
SSO without SCIM lets invited users log in to Opti ID through an Opti ID SSO app that you add to your IdP's app portal. You manage user permissions within Opti ID.
- Complete the initial technical contact login. This is the person who logs into Opti ID first and configures it for the rest of your organization. Contact your CSM if you do not know who the technical contact is. You can change the technical contact later.
- (Optional) Brand your login page.
-
Configure SSO. You can configure up to five SSO connections if needed. Opti ID supports Entra ID, Okta, and PingOne.
- Configure the SAML or OIDC SSO connection in your IdP.
- (Optional) Sync groups from your IdP to Opti ID.
- (Optional) Configure organizational domains to automatically provision users who log in with a specific domain.
- (Optional) Enable IdP-initiated login for a more seamless login experience.
- Review the system roles for your Optimizely products. If you want to personalize permission levels, create custom roles.
- Create groups to simplify the process of giving multiple users the same level of access.
- Invite users, assigning them to roles or groups so that they have the necessary access to your Optimizely products.
Option 3: Configure SSO with SCIM
SSO with SCIM lets you manage user identity and permissions within your IdP and automate the information between your IdP and Opti ID.
- Complete the initial technical contact login. This is the person who logs into Opti ID first and configures it for the rest of your organization. Contact your CSM if you do not know who the technical contact is. You can change the technical contact later.
- (Optional) Brand your login page.
-
Configure SSO. You can configure up to five SSO connections if needed. Opti ID supports Entra ID, Okta, and PingOne.
- Configure the SAML or OIDC SSO connection in your IdP.
- (Optional) Enable IdP-initiated login for a more seamless login experience.
-
Configure SCIM in your IdP.
- Create a SCIM provisioning app in Microsoft Entra ID – Use OIDC or SAML for SSO, and manage SSO and SCIM on two separate Entra ID apps.
- Create a SCIM provisioning app in Okta – Use OIDC or SAML for SSO, and manage SSO and SCIM on two separate Okta apps.
- Create a single Okta app for SCIM provisioning and SAML SSO – Use only SAML for SSO, and manage SSO and SCIM on a single Okta app.
- Create a SCIM provisioning app in PingOne – Use OIDC or SAML for SSO, and manage SSO and SCIM on two separate PingOne apps.
- Review the system roles for your Optimizely products. If you want to personalize permission levels, create custom roles.
- Create groups in your SCIM app to simplify the process of giving multiple users the same level of access.
- Add users to your SCIM app, assigning them to roles or groups so that they have the necessary access to your Optimizely products.
Please sign in to leave a comment.