Okta Integration Network (OIN) integration providing Single Sign-On via OIDC, SCIM 2.0 provisioning for lifecycle management (LCM), and automated backup, disaster recovery, and compliance monitoring for your Okta organization.
The Butterfly Security Okta Integration Network (OIN) integration provides Single Sign-On (SSO) via OIDC, SCIM 2.0 provisioning for lifecycle management (LCM), and automated backup, disaster recovery, and compliance monitoring for your Okta organization. Once installed, your team can sign in to Butterfly Security through Okta, and user accounts are automatically created, updated, and deactivated as your Okta directory changes.
Butterfly Security connects to your Okta org via OAuth 2.0 and gives administrators the ability to perform scheduled or on-demand backups of their identity configuration — users, groups, applications, policies, authorization servers, and 30+ additional resource types. In the event of accidental misconfiguration, unauthorized changes, or a disaster recovery scenario, administrators can restore any supported resource to a previous known-good state directly from the Butterfly Security dashboard.
Schedule hourly, daily, or weekly backups of your entire Okta configuration. Supports 30+ resource types across users, groups, apps, policies, and more.
Restore users, groups, applications, policies, and other supported resources to a previous known-good state. Dry-run preview mode lets administrators review exactly what will change before committing.
Continuous compliance checks against SOC 2, NIST 800-53, HIPAA, PCI DSS, ISO 27001, and CIS Controls frameworks.
Diff any two backup snapshots to see exactly what changed in your Okta configuration over time.
Included on all plans: configure OIDC Single Sign-On so your team can sign in through Okta, and enable SCIM 2.0 automated user provisioning to manage team members and role assignments directly from your Okta admin console.
SSO & SCIM Setup Guide →The following table details each OAuth scope requested by Butterfly Security, what it is used for, and whether it supports backup operations, restore operations, or both. For the complete list of available scopes, see Okta’s official OAuth 2.0 API reference.
okta.users.manageokta.groups.manageokta.apps.manageokta.policies.manageokta.authorizationServers.manageokta.idps.manageokta.roles.manageokta.eventHooks.manageokta.inlineHooks.manageokta.domains.manageokta.profileMappings.manageokta.linkedObjects.manageokta.factors.manageokta.logs.readWhy does Butterfly Security request manage scopes?
Okta .manage scopes include full read access, so a single scope per resource category covers both backup (read) and restore (write) operations. This is why we request .manage rather than separate .read + .manage pairs. The only exception is okta.logs.read, which has no corresponding manage scope.
During backup, Butterfly Security only performs read operations — no data is modified. Write capabilities are only used during explicit administrator-initiated restore operations, which always require manual confirmation and support a dry-run preview mode that shows exactly what will change before any modifications are applied.
Butterfly Security does not access or manage Okta administrator accounts, does not modify configurations outside of restore operations, and does not perform actions beyond identity configuration backup and recovery.
If you experience issues configuring or using the integration, contact our support team.
Email: support@butterflysecurity.org
Available Monday–Friday, 9am–6pm ET. Response within 1 business day.