Supported Identity Providers
Okta
Complete Okta integration with SSO and SCIM provisioning
Google Workspace
Sync users and groups from Google Workspace
Microsoft Entra ID
Azure AD integration for enterprise user management
SAML/SCIM Generic
Generic SAML and SCIM integrations for other providers
Integration Benefits
Single Sign-On (SSO)
- Seamless Login: Users access June with their existing credentials
- Reduced Password Fatigue: Eliminate separate June passwords
- Enhanced Security: Leverage your IdP’s security features
- Compliance: Meet enterprise authentication requirements
Automated User Management
- User Provisioning: Automatically create June accounts
- Attribute Sync: Keep user information up-to-date
- Role Assignment: Map IdP groups to June roles
- Deprovisioning: Disable access when users leave
Enhanced Security
- Multi-Factor Authentication: Leverage existing MFA policies
- Conditional Access: Apply context-aware access controls
- Audit Trail: Comprehensive logging of authentication events
- Risk-Based Authentication: Adaptive security based on user behavior
Quick Start Guide
1. Choose Your Identity Provider
Select your organization’s primary identity provider:1
Enterprise Identity Providers
- Okta: Comprehensive identity management platform
- Microsoft Entra ID: Azure Active Directory for enterprise
- Google Workspace: Google’s identity and productivity suite
2
Generic Standards
- SAML 2.0: Industry standard for SSO
- SCIM 2.0: Standard for user provisioning
- Custom Integration: API-based integration for other providers
2. Prepare Integration Requirements
All identity provider integrations require:- Administrative Access: Admin privileges in your IdP
- June Admin Rights: Organization admin permissions in June
- User Attributes: Understanding of user data structure
- Group Structure: Knowledge of existing groups and roles
3. Follow Provider-Specific Guide
Click on your identity provider above for detailed instructions including:- SSO configuration steps
- User provisioning setup (SCIM)
- Group and role mapping
- Testing and troubleshooting
Common Integration Features
User Attributes
Standard attributes synced across all providers:| Attribute | Description | Required |
|---|---|---|
| Primary identifier and login | Yes | |
| First Name | User’s given name | Yes |
| Last Name | User’s family name | Yes |
| Department | Organizational department | No |
| Job Title | User’s role/position | No |
| Manager | Reporting relationship | No |
| Employee ID | Unique employee identifier | No |
Role Mapping
Map IdP groups to June roles:Administrative Roles
Administrative Roles
- Organization Admin: Full system access
- IT Manager: Device management and reporting
- IT Technician: Basic device operations
Business Roles
Business Roles
- Department Manager: Department-specific access
- Team Lead: Team device oversight
- End User: Personal device access only
Custom Roles
Custom Roles
- Compliance Officer: Audit and compliance access
- Finance Manager: Cost and budget reporting
- Security Analyst: Security monitoring access
Provisioning Actions
Supported SCIM operations:- Create: Automatically create new user accounts
- Read: Retrieve user information and status
- Update: Sync changes to user attributes
- Delete/Deactivate: Disable access for departing users
Authentication Methods
SAML 2.0 SSO
Benefits of SAML integration:- Industry Standard: Widely supported protocol
- Secure: Cryptographically signed assertions
- Flexible: Supports various authentication flows
- Metadata Exchange: Simplified configuration
OAuth/OpenID Connect
Modern authentication features:- API Access: Secure API authentication
- Token-Based: Stateless authentication tokens
- Scope Control: Granular permission management
- Refresh Tokens: Long-lived authentication sessions
Directory Sync
Direct directory integration:- LDAP/Active Directory: Traditional directory services
- API Integration: Modern REST API connections
- Real-Time Sync: Immediate user updates
- Batch Processing: Efficient bulk operations
Best Practices
Security
- Principle of Least Privilege: Grant minimum required access
- Regular Audits: Review user access and permissions periodically
- MFA Enforcement: Require multi-factor authentication
- Session Management: Configure appropriate session timeouts
User Management
- Consistent Naming: Use standard naming conventions for groups
- Automated Lifecycle: Leverage SCIM for user provisioning
- Department Alignment: Align access with organizational structure
- Regular Cleanup: Remove unused accounts and permissions
Integration Health
- Monitor Sync Status: Track provisioning success rates
- Certificate Management: Monitor SAML certificate expiration
- Error Handling: Set up alerts for authentication failures
- Performance Monitoring: Track login times and user experience
User Lifecycle Management
Onboarding
- User Created: New user added to identity provider
- Automatic Provisioning: June account created via SCIM
- Role Assignment: Groups mapped to appropriate June roles
- Device Assignment: Devices allocated based on department/role
- Access Verification: User can log in and access assigned resources
Updates
- Attribute Changes: Department, role, or manager updates
- Automatic Sync: Changes propagated to June
- Permission Updates: Access adjusted based on new attributes
- Device Reassignment: Device access updated if needed
Offboarding
- User Deactivated: Account disabled in identity provider
- Automatic Deprovisioning: June access immediately disabled
- Device Recovery: Devices marked for recovery
- Data Security: Ensure secure handling of departing user data
Troubleshooting
Common Authentication Issues
SSO Login Failures
SSO Login Failures
- Verify SAML configuration and metadata
- Check certificate validity and signing
- Ensure user is assigned to June application
- Review attribute mapping requirements
User Provisioning Problems
User Provisioning Problems
- Verify SCIM endpoint and authentication
- Check required user attributes are present
- Review API rate limits and quotas
- Validate user attribute mappings
Permission Issues
Permission Issues
- Check group membership and role mappings
- Verify June role configuration
- Review department-based access rules
- Test with different user profiles
Getting Help
- Provider-Specific Guides: Detailed troubleshooting in individual guides
- June Support: Contact support for integration assistance
- Community Resources: Join user forums and discussions
- Professional Services: Expert help for complex configurations
Compliance and Auditing
Audit Trail
- Authentication Events: Track all login attempts and outcomes
- Provisioning Activity: Log user creation, updates, and deletions
- Permission Changes: Record role and access modifications
- Integration Health: Monitor sync status and errors
Compliance Features
- SOC 2 Compliance: Meet security and availability requirements
- GDPR Support: Handle user data according to privacy regulations
- Industry Standards: Support for healthcare, finance, and other regulated industries
- Data Retention: Configurable retention policies for audit data
Next Steps
After setting up your identity provider integration:MDM Integration
Connect your device management systems for complete user-device correlation
Employee Onboarding
Set up automated device assignment and onboarding workflows
Access Control
Configure advanced access controls and security policies
Reporting
Generate reports that include user and authentication data
Test all identity provider changes in a development environment before applying to production to avoid user access disruptions.
Identity provider integrations typically sync user data within 15 minutes. Large user bases may require additional time for initial synchronization.