& Construction

Integrated BIM tools, including Revit, AutoCAD, and Civil 3D
& Manufacturing

Professional CAD/CAM tools built on Inventor and AutoCAD
Integrated BIM tools, including Revit, AutoCAD, and Civil 3D
Professional CAD/CAM tools built on Inventor and AutoCAD
Once you have SSO enabled, you can begin the process of implementing directory sync for your account. This will allow you to both create users in Autodesk Account and, using groups, have the new users assigned to software entitlements without you having to access Autodesk Account. Once implemented, synced users and groups are read-only in Autodesk Account and can only be modified by making changes in your active directory and pushing the changes.
To begin an active directory implementation, you must set your directory sync method, as shown in the Setting Up Directory Sync video below and described in the following steps:
Continue to the setup and configuration steps that align with the directory sync method you have selected. The following videos have been provided below to explain the steps:
Transcript
00:02
Directory sync is a critical component of the overall Autodesk user provisioning capability.
00:08
Once an SSO connection is established, the primary and SSO administrators will be permitted to access the setup from Team Settings page.
00:17
Before beginning the setup though, the administrator will need to identify the method of configuring sync.
00:24
This essentially falls into two buckets.
00:26
The first being an old school on-premise type connection,
00:30
which allows an administrator to download a sync tool onto their local servers and use this to connect directly to a solution like active directory.
00:39
This AD agent once provided with the correct access and running permissions will on a predefined schedule pull the local directory for changes,
00:48
and push these to a company-specific spoke in the Autodesk environment and update the company team membership.
00:55
The second connection option is via a system for cross-domain identity management or SCIM.
01:03
This new school approach permits cloud-based directory services to connect directly with Autodesk,
01:09
not requiring any downloads, local network permissions, and when coupled with app templates from the relevant integration service,
01:16
has very few configuration requirements when compared to the on-premise AD agent approach.
01:23
With this in mind and wherever possible, administrators should lean towards a SCIM connection,
01:28
but it is wholly dependent on what your IdP or provisioning service supports.
01:34
It is important to note in terms of the method you choose that once selected you cannot alter the connection type.
01:40
Any additional changes will need to be handled via the support request.
01:43
So, make your choice carefully.
Video transcript
00:02
Directory sync is a critical component of the overall Autodesk user provisioning capability.
00:08
Once an SSO connection is established, the primary and SSO administrators will be permitted to access the setup from Team Settings page.
00:17
Before beginning the setup though, the administrator will need to identify the method of configuring sync.
00:24
This essentially falls into two buckets.
00:26
The first being an old school on-premise type connection,
00:30
which allows an administrator to download a sync tool onto their local servers and use this to connect directly to a solution like active directory.
00:39
This AD agent once provided with the correct access and running permissions will on a predefined schedule pull the local directory for changes,
00:48
and push these to a company-specific spoke in the Autodesk environment and update the company team membership.
00:55
The second connection option is via a system for cross-domain identity management or SCIM.
01:03
This new school approach permits cloud-based directory services to connect directly with Autodesk,
01:09
not requiring any downloads, local network permissions, and when coupled with app templates from the relevant integration service,
01:16
has very few configuration requirements when compared to the on-premise AD agent approach.
01:23
With this in mind and wherever possible, administrators should lean towards a SCIM connection,
01:28
but it is wholly dependent on what your IdP or provisioning service supports.
01:34
It is important to note in terms of the method you choose that once selected you cannot alter the connection type.
01:40
Any additional changes will need to be handled via the support request.
01:43
So, make your choice carefully.
Transcript
00:01
In this video, we will step through the process of configuring directory sync on Okta using the SCIM protocol.
00:08
The first action here is to select the connection type.
00:11
From the accounts menu, select user management by group.
00:16
Here, we see the name of the team you are currently adding the connection to.
00:20
If it is not correct, ensure that you change the team right now.
00:24
From the top right, select the settings tab.
00:27
Here, we see the administrative controls now for SSO and directory sync.
00:31
It is important to note that SSO must be enabled on the selected team,
00:35
in order to start directory sync configuration, and at present there is only one connection permitted per team.
00:42
After selecting to set up directory sync, select the Okta scheme option.
00:48
The next screen displays the tenant URL and secret token required for input into the Okta connection.
00:54
These values are unique to each connection and the secret should not be shared or made known to anyone else.
00:60
It is important for the integrity of your connection.
01:03
For now, though, this is all that's required in the Autodesk console.
01:06
We will come back to copy these values, but the remainder of the setup should be completed in Okta.
01:13
Moving across from the Okta portal,
01:15
select to edit your existing Autodesk SSO connection if one exists or select to create new and search for Autodesk SSO.
01:25
From the applications tab, browse catalog and search for the Autodesk SSO app.
01:31
Select the template app and click Add to correct this.
01:37
This application should not need to be displayed to users, click Done to complete the initial set creation.
01:46
You should now find yourself on the assignments tab, but we can add the groups you wish to have access to the connection and ultimately synced.
01:52
Here, we will select an existing engineering group.
01:55
Again click Done and we can see the users added via the group.
01:60
Moving across the Provisioning tab, we can select to configure the API connection.
02:07
Here, after enabling the connection, we will need to copy in the URL and the secret from the orders admin portal we identified previously.
02:16
Copying these values across remembering they should be kept confidential, you can now test the connection.
02:22
This ensures the correct values have been added and gives us instant feedback on the successful connection across systems.
02:29
If you see any issue here, you should check the correct values have been copied.
02:35
Once successful, select to save the connection.
02:38
The next step is to ensure the correct user settings are enabled.
02:41
Select Edit here and enable create users, update user attributes and deactivate users.
02:52
Click Save, and finally we are going to set up the groups we wished to sync to Autodesk team on this connection.
02:60
From the Push Groups tab, you can now select the groups to be synced using methods like selecting by name or creating a rule.
03:07
If we select to create a rule here, I will enter the starts with eng option to pick up the engineering name.
03:16
Now that the group is set to push immediately once found, meaning that once we set up this rule,
03:20
the corresponding groups should sync immediately, select to create that rule.
03:26
Now we are getting back to all groups, we can see that the group listed here with the current push status set to active.
03:34
Toggling back to Autodesk account, we can check how successful our connection has been.
03:39
Under the manage user by groups tab, we can see the synced engineering group.
03:45
Moving across the users tab, here are two synced users, identify this coming across by a directory sync.
Video transcript
00:01
In this video, we will step through the process of configuring directory sync on Okta using the SCIM protocol.
00:08
The first action here is to select the connection type.
00:11
From the accounts menu, select user management by group.
00:16
Here, we see the name of the team you are currently adding the connection to.
00:20
If it is not correct, ensure that you change the team right now.
00:24
From the top right, select the settings tab.
00:27
Here, we see the administrative controls now for SSO and directory sync.
00:31
It is important to note that SSO must be enabled on the selected team,
00:35
in order to start directory sync configuration, and at present there is only one connection permitted per team.
00:42
After selecting to set up directory sync, select the Okta scheme option.
00:48
The next screen displays the tenant URL and secret token required for input into the Okta connection.
00:54
These values are unique to each connection and the secret should not be shared or made known to anyone else.
00:60
It is important for the integrity of your connection.
01:03
For now, though, this is all that's required in the Autodesk console.
01:06
We will come back to copy these values, but the remainder of the setup should be completed in Okta.
01:13
Moving across from the Okta portal,
01:15
select to edit your existing Autodesk SSO connection if one exists or select to create new and search for Autodesk SSO.
01:25
From the applications tab, browse catalog and search for the Autodesk SSO app.
01:31
Select the template app and click Add to correct this.
01:37
This application should not need to be displayed to users, click Done to complete the initial set creation.
01:46
You should now find yourself on the assignments tab, but we can add the groups you wish to have access to the connection and ultimately synced.
01:52
Here, we will select an existing engineering group.
01:55
Again click Done and we can see the users added via the group.
01:60
Moving across the Provisioning tab, we can select to configure the API connection.
02:07
Here, after enabling the connection, we will need to copy in the URL and the secret from the orders admin portal we identified previously.
02:16
Copying these values across remembering they should be kept confidential, you can now test the connection.
02:22
This ensures the correct values have been added and gives us instant feedback on the successful connection across systems.
02:29
If you see any issue here, you should check the correct values have been copied.
02:35
Once successful, select to save the connection.
02:38
The next step is to ensure the correct user settings are enabled.
02:41
Select Edit here and enable create users, update user attributes and deactivate users.
02:52
Click Save, and finally we are going to set up the groups we wished to sync to Autodesk team on this connection.
02:60
From the Push Groups tab, you can now select the groups to be synced using methods like selecting by name or creating a rule.
03:07
If we select to create a rule here, I will enter the starts with eng option to pick up the engineering name.
03:16
Now that the group is set to push immediately once found, meaning that once we set up this rule,
03:20
the corresponding groups should sync immediately, select to create that rule.
03:26
Now we are getting back to all groups, we can see that the group listed here with the current push status set to active.
03:34
Toggling back to Autodesk account, we can check how successful our connection has been.
03:39
Under the manage user by groups tab, we can see the synced engineering group.
03:45
Moving across the users tab, here are two synced users, identify this coming across by a directory sync.
Transcript
00:02
In this video, we will step through the process of configuring directory sync on Microsoft Azure using the SCIM protocol.
00:10
The first action here is to select the connection type in the Autodesk administrative console.
00:16
From the account menu, select the user management by group.
00:21
Here, we see the name of the team you are currently adding the connection to.
00:24
If this is not correct, ensure that you change the team before continuing.
00:29
From the top right, select the settings tab.
00:33
It is important to note that SSO must be enabled on the selected team in order to start directory sync configuration,
00:39
and at present there is only one connection permitted per team.
00:44
After selecting to setup directory sync, select the Microsoft Azure AD SCIM option.
00:51
The next screen displays the tenant URL and secret token required for input into the Azure connection.
00:57
These values are unique to each connection and the secret should not be shared or made known to anyone else.
01:03
It is important for the integrity of your connection.
01:07
For now, this is all that's required in the Autodesk console, but the rest of the setup to be completed in the Azure.
01:15
Moving across the Azure admin interface,
01:17
if you have previously configured a SAML connection for Azure, you should be able to configure your existing orders SSO app.
01:24
Otherwise, select to create a new gallery app from the main menu and select Autodesk SSO.
01:31
Once inside the Autodesk SSO app, click on the Provisioning option and provision user accounts.
01:38
Provisioning mode should be set to automatic to ensure the user and groups are kept in sync.
01:43
By expanding the admin credentials, under this you will see the URL and secret token fields.
01:50
Copy and paste these values from the Autodesk admin console we looked at previously.
01:56
Once this has been filled out, you should now be able to test the connection.
02:00
This action ensures that your Azure scheme connection is able to communicate with the correct endpoint on the Autodesk side.
02:07
If this is not successful, you need to re-verify the correct values were copied across from the Autodesk console.
02:15
Once the test is successful though, we can get on with ensuring that the properties are mapped correctly.
02:22
Expanding the mapping section here, there are two options, for groups and user mapping.
02:28
If you have used the default Autodesk SSO gallery app, these values should already be prefilled.
02:33
Looking at the Provision Azure Active Directory Group list first,
02:37
you should validate that the create, update, and delete checkboxes are marked for target object actions.
02:44
From an attribute perspective, the group's display name and members should be mapped here.
02:51
Select Save to return to the main setup page.
02:57
Click on Provision Azure Active Directory Users.
03:01
Again select create, update, and delete actions and ensure that the values have been mapped correctly.
03:08
There are a few here, but looking at specifically for users, we need given name, surname, object ID,
03:16
the user principal name, and switch should also be configured as shown in the video.
03:23
Once again, save to complete the mapping settings.
03:26
The final step before enabling sync is to add the groups and users you wish to sync.
03:31
For the best and most efficient results, it is optimal to assign groups to this connection.
03:36
By selecting the users and groups tab of the app, search for ad groups you wish to have synced with your Autodesk account.
03:44
Note here, you can choose individual users, but from a provisioning perspective, groups are preferred.
03:50
Also note, this is a critical step, requiring close attention,
03:54
as all the users in this selected group will be created in your Autodesk account along with the group selected,
03:59
make sure you have the right users set.
04:02
From here, you can turn to the main page on the connection setup and select Start Provisioning.
04:08
All being well, the administrator should see immediate feedback,
04:10
in terms of the sync status with the number of groups and users successfully synced as well as the time taken.
04:19
The final step in this process is to return to the user management page in the Autodesk account.
04:25
Close out of this administrative setup section,
04:27
and go to the Groups tab to ensure the correct users and groups are appearing in your user management section.
Video transcript
00:02
In this video, we will step through the process of configuring directory sync on Microsoft Azure using the SCIM protocol.
00:10
The first action here is to select the connection type in the Autodesk administrative console.
00:16
From the account menu, select the user management by group.
00:21
Here, we see the name of the team you are currently adding the connection to.
00:24
If this is not correct, ensure that you change the team before continuing.
00:29
From the top right, select the settings tab.
00:33
It is important to note that SSO must be enabled on the selected team in order to start directory sync configuration,
00:39
and at present there is only one connection permitted per team.
00:44
After selecting to setup directory sync, select the Microsoft Azure AD SCIM option.
00:51
The next screen displays the tenant URL and secret token required for input into the Azure connection.
00:57
These values are unique to each connection and the secret should not be shared or made known to anyone else.
01:03
It is important for the integrity of your connection.
01:07
For now, this is all that's required in the Autodesk console, but the rest of the setup to be completed in the Azure.
01:15
Moving across the Azure admin interface,
01:17
if you have previously configured a SAML connection for Azure, you should be able to configure your existing orders SSO app.
01:24
Otherwise, select to create a new gallery app from the main menu and select Autodesk SSO.
01:31
Once inside the Autodesk SSO app, click on the Provisioning option and provision user accounts.
01:38
Provisioning mode should be set to automatic to ensure the user and groups are kept in sync.
01:43
By expanding the admin credentials, under this you will see the URL and secret token fields.
01:50
Copy and paste these values from the Autodesk admin console we looked at previously.
01:56
Once this has been filled out, you should now be able to test the connection.
02:00
This action ensures that your Azure scheme connection is able to communicate with the correct endpoint on the Autodesk side.
02:07
If this is not successful, you need to re-verify the correct values were copied across from the Autodesk console.
02:15
Once the test is successful though, we can get on with ensuring that the properties are mapped correctly.
02:22
Expanding the mapping section here, there are two options, for groups and user mapping.
02:28
If you have used the default Autodesk SSO gallery app, these values should already be prefilled.
02:33
Looking at the Provision Azure Active Directory Group list first,
02:37
you should validate that the create, update, and delete checkboxes are marked for target object actions.
02:44
From an attribute perspective, the group's display name and members should be mapped here.
02:51
Select Save to return to the main setup page.
02:57
Click on Provision Azure Active Directory Users.
03:01
Again select create, update, and delete actions and ensure that the values have been mapped correctly.
03:08
There are a few here, but looking at specifically for users, we need given name, surname, object ID,
03:16
the user principal name, and switch should also be configured as shown in the video.
03:23
Once again, save to complete the mapping settings.
03:26
The final step before enabling sync is to add the groups and users you wish to sync.
03:31
For the best and most efficient results, it is optimal to assign groups to this connection.
03:36
By selecting the users and groups tab of the app, search for ad groups you wish to have synced with your Autodesk account.
03:44
Note here, you can choose individual users, but from a provisioning perspective, groups are preferred.
03:50
Also note, this is a critical step, requiring close attention,
03:54
as all the users in this selected group will be created in your Autodesk account along with the group selected,
03:59
make sure you have the right users set.
04:02
From here, you can turn to the main page on the connection setup and select Start Provisioning.
04:08
All being well, the administrator should see immediate feedback,
04:10
in terms of the sync status with the number of groups and users successfully synced as well as the time taken.
04:19
The final step in this process is to return to the user management page in the Autodesk account.
04:25
Close out of this administrative setup section,
04:27
and go to the Groups tab to ensure the correct users and groups are appearing in your user management section.
Transcript
00:02
In this video, we will review setting up directory sync to your On-premise active directory by the AD agent.
00:11
On the Autodesk account menu, select your user management by group.
00:15
At the top of the screen, here, you will see the name of the team you are currently adding the connection to.
00:21
If this is not correct, ensure that you have changed the team to reflect where you want your users to appear,
00:27
and from the top right, select the settings tab.
00:31
It is important to know that SSO must be enabled on the selected team in order to start directory sync configuration,
00:37
and at present there is only one connection permitted per team.
00:43
After selecting to set up directory sync, select the On-premise option and click Next.
00:50
The next screen prompts for an administrator.
00:53
This administrator will be added to an Okta administrative portal to download and configure the AD agent.
00:60
Meaning that in addition to being a primary SSO admin in this Autodesk team,
01:05
the admin should also have permissions to download and install the AD agent component on a member server.
01:12
During configuration, this administrator will also be required to sign in to active directory in order to establish the connection with the AD agent.
01:23
The admin is now notified that an invite is on the way and points to the next step in the process.
01:29
At this point, an Okta spoke is created for the administrator to complete the connection to Autodesk.
01:36
This process usually takes a few moments.
01:39
Once completed, the admin should receive an email in order to complete the setup.
01:44
Select Close to complete this initial portion of the setup.
01:47
We will return here later to complete and enable the configuration.
01:54
Right here, you can see the email the admin will receive from Okta.
01:58
This email contains a link to complete admin user creation,
02:02
including setting up password as well as the details around the email address,
02:06
to be used to access the admin console and a separate link to the console.
02:11
Note this information, as you may need to return to the console more than once during setup and maintenance of your connection.
02:19
The setup should now shift to the server you wish to run the agent on.
02:24
Once the email is received, follow the link to your admin console and complete your admin account creation.
02:31
After signing into the Autodesk supplied Okta spoke, you should find yourself on the dashboard.
02:39
Expanding the menu, continue down to the directory section, and select Directory Integration.
02:47
From here, you see the option to Add Active Directory, click this,
02:53
you will be provided an overview of the setup including the system requirements for install.
02:59
Review this and select Setup Active Directory when ready to proceed.
03:06
You are now seeing an option to download the AD agent, select Download Agent.
03:11
While this is downloading, you will see here the specific spoke settings you have been provided to set the connection,
03:16
including the URL and the admin account.
03:20
Please note that after download is complete, you can begin the install.
03:23
However, this component should be installed on a server with access to your local active directory,
03:28
and the internet connection in order to complete connection to Okta spoke.
03:33
Select to install, run as administrator if required.
03:37
As part of the install and configuration process, you will need to specify the domain you would like to sync to Autodesk team.
03:44
Enter the domain here and select Next.
03:47
You will now be prompted to enter a service account to run the AD agent.
03:52
If an Okta service account already exists, this will be used.
03:56
Otherwise, you can set one up in this step as the recommended outcome.
04:01
That there is also an option to specify another service account.
04:06
Next, enter the credentials for the service account to run.
04:10
If there are any proxy servers to navigate for the internet access,
04:13
these can be specified during the setup by clicking Use Proxy Server, otherwise click Next to continue.
04:21
Select Production as the environment for your connection.
04:24
Obviously, this is important to make sure you are connecting to the right environment.
04:28
From the spoke admin screen, now enter the domain.
04:33
All being correct up to this point, when you click Next, a connection to Autodesk spoke will be initiated,
04:39
and you will be prompted to enter the credentials for Okta admin account created at the start of this process.
04:46
Once verified, you will see the permission screen where you can allow this agent speak to your Autodesk provided Okta spoke.
04:53
Select Allow Access, and with that, the install should be complete.
04:59
You can select Finish and the admin console will confirm that the AD agent has started.
05:05
This does not mean of course that your users have started to sync,
05:08
but the agent is now connected and ready to sync once we have set the sync properties and defined the group to sync, which is the next step.
Video transcript
00:02
In this video, we will review setting up directory sync to your On-premise active directory by the AD agent.
00:11
On the Autodesk account menu, select your user management by group.
00:15
At the top of the screen, here, you will see the name of the team you are currently adding the connection to.
00:21
If this is not correct, ensure that you have changed the team to reflect where you want your users to appear,
00:27
and from the top right, select the settings tab.
00:31
It is important to know that SSO must be enabled on the selected team in order to start directory sync configuration,
00:37
and at present there is only one connection permitted per team.
00:43
After selecting to set up directory sync, select the On-premise option and click Next.
00:50
The next screen prompts for an administrator.
00:53
This administrator will be added to an Okta administrative portal to download and configure the AD agent.
00:60
Meaning that in addition to being a primary SSO admin in this Autodesk team,
01:05
the admin should also have permissions to download and install the AD agent component on a member server.
01:12
During configuration, this administrator will also be required to sign in to active directory in order to establish the connection with the AD agent.
01:23
The admin is now notified that an invite is on the way and points to the next step in the process.
01:29
At this point, an Okta spoke is created for the administrator to complete the connection to Autodesk.
01:36
This process usually takes a few moments.
01:39
Once completed, the admin should receive an email in order to complete the setup.
01:44
Select Close to complete this initial portion of the setup.
01:47
We will return here later to complete and enable the configuration.
01:54
Right here, you can see the email the admin will receive from Okta.
01:58
This email contains a link to complete admin user creation,
02:02
including setting up password as well as the details around the email address,
02:06
to be used to access the admin console and a separate link to the console.
02:11
Note this information, as you may need to return to the console more than once during setup and maintenance of your connection.
02:19
The setup should now shift to the server you wish to run the agent on.
02:24
Once the email is received, follow the link to your admin console and complete your admin account creation.
02:31
After signing into the Autodesk supplied Okta spoke, you should find yourself on the dashboard.
02:39
Expanding the menu, continue down to the directory section, and select Directory Integration.
02:47
From here, you see the option to Add Active Directory, click this,
02:53
you will be provided an overview of the setup including the system requirements for install.
02:59
Review this and select Setup Active Directory when ready to proceed.
03:06
You are now seeing an option to download the AD agent, select Download Agent.
03:11
While this is downloading, you will see here the specific spoke settings you have been provided to set the connection,
03:16
including the URL and the admin account.
03:20
Please note that after download is complete, you can begin the install.
03:23
However, this component should be installed on a server with access to your local active directory,
03:28
and the internet connection in order to complete connection to Okta spoke.
03:33
Select to install, run as administrator if required.
03:37
As part of the install and configuration process, you will need to specify the domain you would like to sync to Autodesk team.
03:44
Enter the domain here and select Next.
03:47
You will now be prompted to enter a service account to run the AD agent.
03:52
If an Okta service account already exists, this will be used.
03:56
Otherwise, you can set one up in this step as the recommended outcome.
04:01
That there is also an option to specify another service account.
04:06
Next, enter the credentials for the service account to run.
04:10
If there are any proxy servers to navigate for the internet access,
04:13
these can be specified during the setup by clicking Use Proxy Server, otherwise click Next to continue.
04:21
Select Production as the environment for your connection.
04:24
Obviously, this is important to make sure you are connecting to the right environment.
04:28
From the spoke admin screen, now enter the domain.
04:33
All being correct up to this point, when you click Next, a connection to Autodesk spoke will be initiated,
04:39
and you will be prompted to enter the credentials for Okta admin account created at the start of this process.
04:46
Once verified, you will see the permission screen where you can allow this agent speak to your Autodesk provided Okta spoke.
04:53
Select Allow Access, and with that, the install should be complete.
04:59
You can select Finish and the admin console will confirm that the AD agent has started.
05:05
This does not mean of course that your users have started to sync,
05:08
but the agent is now connected and ready to sync once we have set the sync properties and defined the group to sync, which is the next step.
Transcript
00:03
By now, you should have successfully installed the Okta AD agent, set access and started the service.
00:11
Next, we will continue with the users and properties to be mapped to your Autodesk account.
00:18
Continue on, now on the basic start page, step two in the admin console window,
00:23
we are able to select the organization units or the OUs, which contain the users and groups to be synced.
00:30
Make sure these are correct and at the bottom of the page ensure that Okta username format is set to UPN.
00:38
Click Next to start setting up the basic user profile, which is all the properties we will collect on sync to users.
00:45
In this case, we are only requiring the users' first and last names, email, and object ID or a unique identifier.
00:55
It is critical to get these properties right, so please ensure that they match exactly the property values shown below.
01:01
You can now select Next, review the summary and help documentation offered around setup.
01:10
The final step here is to define the sync settings between active directory and Okta spoke to Autodesk.
01:19
Clicking on the Provisioning tab, select To Okta and select Edit.
01:25
Set the value for the scheduled import, here we are going to select four outlets.
01:31
For Okta username, select again the User UPN.
01:36
Under JIT or Just in Time creation, we recommend enabling this for new users to be granted access on sign-in.
01:43
Keep in mind, this is simply adding users to the Okta connection to be eligible for sync-only.
01:48
Select to enable universal security group if you are enabling JIT.
01:54
Click Save and we will move onto the configuring user matching.
01:59
Here, we recommend selecting Okta username as the match and auto-activate new users.
02:06
Under profile mastering, select the following to ensure correct user behaviors, save all the settings now to complete the profile.
02:16
All right, the final step is to identify the groups and users to be synced with Autodesk.
02:23
Here, you need to first import your active directory users.
02:27
On the Import tab, select to import new.
02:31
This says two options here, to do an incremental or a full import.
02:34
It should not matter for the first time.
02:37
But depending on how many users you are, this initial import may take some time.
02:44
After importing, any user conflicts that might exist, duplicate users, will require fixing to complete a list of new users imported.
02:52
For a first-time import, this should be limited.
02:55
You can now select the actual groups and users from those imported you would like to include in the regular sync.
03:02
From the admin menu select directory groups, from the available list select the groups you would like to sync to Autodesk account.
03:11
Please be careful with your selection here, ensuring you are syncing just the required user groups.
03:17
Once one or more groups' users are added, we are done with the Okta console.
03:22
The admin now should return to the Autodesk account to enable sync for this active directory connection.
03:29
From the connection list, on the admin page, select the AD agent connection and edit.
03:34
Under this dialog, select Enable Connection, you should now be able to return to the manage users by group page,
03:39
and see the synced read-only groups up here containing all of our synced read-only users.
Video transcript
00:03
By now, you should have successfully installed the Okta AD agent, set access and started the service.
00:11
Next, we will continue with the users and properties to be mapped to your Autodesk account.
00:18
Continue on, now on the basic start page, step two in the admin console window,
00:23
we are able to select the organization units or the OUs, which contain the users and groups to be synced.
00:30
Make sure these are correct and at the bottom of the page ensure that Okta username format is set to UPN.
00:38
Click Next to start setting up the basic user profile, which is all the properties we will collect on sync to users.
00:45
In this case, we are only requiring the users' first and last names, email, and object ID or a unique identifier.
00:55
It is critical to get these properties right, so please ensure that they match exactly the property values shown below.
01:01
You can now select Next, review the summary and help documentation offered around setup.
01:10
The final step here is to define the sync settings between active directory and Okta spoke to Autodesk.
01:19
Clicking on the Provisioning tab, select To Okta and select Edit.
01:25
Set the value for the scheduled import, here we are going to select four outlets.
01:31
For Okta username, select again the User UPN.
01:36
Under JIT or Just in Time creation, we recommend enabling this for new users to be granted access on sign-in.
01:43
Keep in mind, this is simply adding users to the Okta connection to be eligible for sync-only.
01:48
Select to enable universal security group if you are enabling JIT.
01:54
Click Save and we will move onto the configuring user matching.
01:59
Here, we recommend selecting Okta username as the match and auto-activate new users.
02:06
Under profile mastering, select the following to ensure correct user behaviors, save all the settings now to complete the profile.
02:16
All right, the final step is to identify the groups and users to be synced with Autodesk.
02:23
Here, you need to first import your active directory users.
02:27
On the Import tab, select to import new.
02:31
This says two options here, to do an incremental or a full import.
02:34
It should not matter for the first time.
02:37
But depending on how many users you are, this initial import may take some time.
02:44
After importing, any user conflicts that might exist, duplicate users, will require fixing to complete a list of new users imported.
02:52
For a first-time import, this should be limited.
02:55
You can now select the actual groups and users from those imported you would like to include in the regular sync.
03:02
From the admin menu select directory groups, from the available list select the groups you would like to sync to Autodesk account.
03:11
Please be careful with your selection here, ensuring you are syncing just the required user groups.
03:17
Once one or more groups' users are added, we are done with the Okta console.
03:22
The admin now should return to the Autodesk account to enable sync for this active directory connection.
03:29
From the connection list, on the admin page, select the AD agent connection and edit.
03:34
Under this dialog, select Enable Connection, you should now be able to return to the manage users by group page,
03:39
and see the synced read-only groups up here containing all of our synced read-only users.
How to buy
Privacy | Do not sell or share my personal information | Cookie preferences | Report noncompliance | Terms of use | Legal | © 2025 Autodesk Inc. All rights reserved
Sign in to start learning
Sign in for unlimited free access to all learning content.Save your progress
Take assessments
Receive personalized recommendations
May we collect and use your data?
Learn more about the Third Party Services we use and our Privacy Statement.May we collect and use your data to tailor your experience?
Explore the benefits of a customized experience by managing your privacy settings for this site or visit our Privacy Statement to learn more about your options.