Install the Butterfly Security app from the Okta Integration Network and configure Single Sign-On and SCIM 2.0 provisioning for your team.
The Butterfly Security app is available in the Okta Integration Network (OIN) and provides both Single Sign-On (OIDC) and SCIM 2.0 provisioning in a single integration. Once installed, your team members can sign in to Butterfly Security through Okta — no separate passwords needed — and user accounts are automatically created, updated, and deactivated as your Okta directory changes.
SSO and SCIM are included on all plans. This integration has its own Client ID and Client Secret, separate from the API Service Integration used for backup and recovery. The SSO/SCIM app handles authentication and provisioning, while the API Service Integration handles backup API access.
Team members sign in through Okta using their existing credentials. No separate Butterfly Security password required.
Create, update, and deactivate users automatically in Butterfly Security when your Okta directory changes.
Five built-in roles exposed as SCIM entitlements. Assign roles via the SCIM roles attribute for automated access control.
Back-channel logout support ensures sessions are revoked immediately when an admin removes access in Okta.
Separate from API credentials: This SSO/SCIM integration uses its own Client ID and Client Secret, different from the API Service Integration. You will find these values in the Okta Admin Console under the SSO/SCIM app's Sign On tab.
Find this under Security → API → Authorization Servers in the Okta Admin Console.
Comma-separated. Users with these email domains will be automatically redirected to SSO at login.
First-time users: Users who sign in via SSO for the first time are automatically added to your team with the read_only role. You can change their role in team settings or automate it with SCIM entitlements.
SP-initiated SSO allows users to start the sign-in flow from the Butterfly Security login page rather than from Okta.
user@yourcompany.com).How domain detection works: When SSO is configured, the admin specifies one or more email domains (e.g., yourcompany.com). Any user who enters an email with a matching domain at the Butterfly login page is automatically redirected to the configured Okta authorization server for authentication.
Not supported: Import New Users, Import Profile Updates, Group Push, and Sync Password are not supported. Butterfly Security is not a profile source — user profiles are always sourced from Okta and pushed to Butterfly. Role assignment is handled via SCIM entitlements (the roles attribute) rather than group push.
Before enabling provisioning in Okta, you need to generate a bearer token in Butterfly Security.
Important: The SCIM bearer token is shown only once. If you lose it, you must click Rotate Token to generate a new one, then update the token in Okta.
Not supported: Import New Users and Import Profile Updates are not supported. Butterfly Security does not act as a profile source — user profiles are always sourced from Okta and pushed to Butterfly, not the other way around.
userName format: Butterfly Security requires the userName attribute to be a valid email address (e.g., user@example.com). Ensure that Okta's userName value for the app matches the user's primary email address.
Each role controls what a team member can do in the Butterfly Security dashboard. Roles are assigned via SCIM entitlements, entitlement governance, or manually in team settings.
super_adminFull access including team management, billing, and SSO/SCIM configuration.
adminManage connections, run backups, restore, and view compliance reports.
backup_operatorRun backups, test connections, edit schedules, and view reports.
auditorRead-only access to backups, compliance, and reports. Cannot modify.
read_onlyView connections and backup list only. Cannot view backup contents.
The following attributes are mapped from Okta to Butterfly Security user profiles.
userNamename.givenNamename.familyNameCustom role assignment: To assign roles during provisioning, use the Butterfly extension schema in your SCIM payloads:
If you experience issues configuring SSO or SCIM provisioning, contact our support team.
Email: support@butterflysecurity.org
Available Monday–Friday, 9am–6pm ET. Response within 1 business day.