Skip to content
English
  • There are no suggestions because the search field is empty.

SSO & SCIM App Installation Guide: Part A: Install from Okta for IT Admin

For IT Administrators

The Wellness Coach app is available as a pre-configured integration in both the Okta
Integration Network (OIN) and Microsoft Entra ID (Azure AD) App Gallery. This guide walks you through installing the app, configuring single sign-on (SSO), and setting up automated user provisioning (SCIM).
After setup, your employees can sign in to Wellness Coach using their corporate credentials, and user accounts are automatically created, updated, and deactivated based on your identity provider (IdP) assignments.

1.1 What You Will Need

Item Where to Get It
Relay State (corporate_id)  Wellness Coach Admin Portal > SSO Settings
SCIM Bearer Token Wellness Coach Admin Portal > SCIM Settings > Generate Token
Admin access to Okta or Azure Your organization's IdP admin console

Note: Contact your Wellness Coach account manager if you do not see the SSO or SCIM
settings in your admin portal.

1.2 Setup Time

With the pre-configured app, setup takes approximately 10-15 minutes (compared to 30+ minutes for manual SAML configuration).


PART A: Install from Okta

2. Install Wellness Coach in Okta

2.1 Find the App

1. Sign in to your Okta Admin Console.

2. Go to Applications > Applications.

3. Click Browse App Catalog.

4. Search for "Wellness Coach".

5. Click Add Integration.
[Screenshot: Okta Admin > Browse App Catalog > search "Wellness Coach" > Add Integration]

2.2 General Settings
1. Application label: Keep the default "Wellness Coach" or customize.
2. Click Next.

2.3 Configure SSO (Sign-On Tab)
The SAML settings (Entity ID, ACS URL, NameID) are pre-configured. You only need to provide one value:

Field Action
Default Relay State Enter your Relay State (corporate_id) from Wellness Coach Admin Portal
All other SAML fields Pre-configured — do not change

[Screenshot: Okta > Wellness Coach > Sign On tab > Default Relay State field]

Note: The Relay State tells Wellness Coach which enterprise account this SSO login
belongs to. It is required for IdP-initiated SSO (clicking the Okta tile).

3. Click Done / Save.

2.4 Configure Provisioning (SCIM)
1. Go to the Provisioning tab.
2. Click Configure API Integration.
3. Check Enable API integration.
4. Fill in the credentials:

Field Value
Base URL Pre-configured (do not change)
API Token Paste your SCIM Bearer Token from Wellness Coach
Admin Portal > SCIM Settings

5. Click Test API Credentials. You should see a success message.
6. Click Save.

[Screenshot: Okta > Provisioning > API Integration > Test API Credentials]

2.5 Enable Provisioning Actions
1. Still in Provisioning, go to the To App tab.
2. Click Edit and enable:
• Create Users
• Update User Attributes
• Deactivate Users
3. Click Save.
Tip: Leave the attribute mappings at their defaults unless you have specific requirements.

2.6 Assign Users & Groups
1. Go to the Assignments tab.
2. Click Assign > Assign to People (or Assign to Groups).
3. Select the users or groups who should have access to Wellness Coach.
4. Click Assign > Done.
Assigned users will be automatically provisioned in Wellness Coach via SCIM within a few minutes

2.7 Test SSO
1. Open a new incognito/private browser window.
2. Go to your Okta dashboard (e.g., yourcompany.okta.com).
3. Click the Wellness Coach tile.
4. You should be automatically signed in to Wellness Coach.
If you get an error, verify your Relay State value is correct and that the user is assigned to the app.