Provision with OneLogin
This article describes how to provision users in Sumo Logic with OneLogin.
Prerequisites
Create an access key
Create an access key. (We recommend using a service account to create the access key.) This access key will provide authorization to provision users from OneLogin into Sumo Logic.
When you create the access key, copy its access ID and access key values. You will enter these when you use Base64 encoding to Base64 encode <access ID>:<access key>
to generate a token.
Configure provisioning with OneLogin
Step 1: Create the app
- Log in to your OneLogin account as an administrator.
- Select Applications > Applications.
- Click Add App.
- Select SCIM Provisioner with SAML (SCIM v2 Enterprise).
- Change the Display Name to the name you want to use for your app.
- Click Save.
Step 2: Set up single sign-on
Follow the directions in Configure a SAML app in OneLogin beginning with the step where you configure the SSO tab.

When you follow these instructions, on the Configuration tab you'll add the SAML Audience URL and SAML Consumer URL. Obtain these values from the assertion consumer URL and entity ID on the SAML configuration of the Sumo Logic tenant where you will provision users.
Also on the Configuration tab, for SCIM Base URL enter the API endpoint for your deployment for the SCIM User Management APIs using the format <api-endpoint>/v1/scim/
. For example, https://api.sumologic.com/api/v1/scim/
. You will perform additional configuration of the app later.
Step 3: Set up roles
- Add a custom role field:
- From the main menu, select Users > Custom User Fields.
- Click New User Field.
- For Name enter
roles
. - For Short name enter
roles
. - Click Save.
- Navigate to Applications > Applications.
- Select the application you created in Step 1.
- Select Parameters.
- Add the
role
parameter:- Click +.
- In Name enter
roles
. - Select Include in SAML Assertion.
- Click Save.
- In Value select roles (Custom).
- Click Save.
- Add the rest of the parameters as shown. When you add the custom parameters, select Include in SAML assertion.
Step 4: Set up provisioning
- In the app, select Configuration.
- Configure the app:
- Enter the SAML Audience URL (entity ID) and SAML Consumer URL (assertion consumer URL) for your Sumo Logic instance:
Obtain the assertion consumer URL and entity ID from the SAML configuration of the Sumo Logic tenant where you will provision users. You set up this SAML configuration in Step 2. - For API Status, click Enable.
- For SCIM Base URL, ensure that you have entered the API endpoint for your deployment for the SCIM User Management APIs using the format
<api-endpoint>/v1/scim/
. For example,https://api.sumologic.com/api/v1/scim/
. - For SCIM JSON Template, enter the following:
{
"schemas": [
"urn:ietf:params:scim:schemas:core:2.0:User"
],
"userName": "{$parameters.scimusername}",
"name": {
"familyName": "{$user.lastname}",
"givenName": "{$user.firstname}"
},
"emails": [{
"value": "{$user.email}",
"type": "work",
"primary": true
}],
"roles": [{
"value": "{$user.custom_fields.roles}",
"primary": true
}]
} - For Custom Headers, enter:
Accept: application/scim+json
Content-Type: application/scim+json - For SCIM Bearer Token, use Base64 encoding to encode
<access ID>:<access key>
(see Prerequisites). Enter the resulting value into the SCIM Bearer Token field. - Click Save.
- Enter the SAML Audience URL (entity ID) and SAML Consumer URL (assertion consumer URL) for your Sumo Logic instance:
- Enable provisioning:
- In the app, select Provisioning.
- Select Enable Provisioning.
- Click Save.
Step 5: Assign users to the app
- Create a new user:
- From the main menu, select Users > Users.
- Click New User.
- Enter First Name, Last Name, and Email.
- Under Custom Fields, for roles enter
Administrator
. - Click Save User.
- Assign the app to the user:
- While viewing the user, click Applications.
- Click +.
- Select the app you created in Step 1.
- Click Continue.
- Click Save.
- Approve the user for provisioning:
- From the main menu, select Applications > Applications.
- Select the application you created in Step 1.
- Select Users.
- Click Pending on the user you want to approve for provisioning.
- Click Approve.
- The user is provisioned to Sumo Logic.
Step 6: Verify provisioning
Users assigned to the app are provisioned into Sumo Logic.
- Verify in OneLogin:
- In the main menu, select Provisioning and then select the Monitoring tab.
- The events for provisioned users should appear. Click an event for details.
- Verify in Sumo Logic:
- Log in to the Sumo Logic instance that you linked to the provisioning app in Step 2 when you provided the Assertion Consumer URL and entity ID.
- Classic UI. In the main Sumo Logic menu, select Administration > Users and Roles > Users.
New UI. In the top menu select Administration, and then under Users and Roles select Users. You can also click the Go To... menu at the top of the screen and select Users. - Search for the users provisioned from OneLogin.
- You should see the users listed, and with the role given to when you assigned them to the app in OneLogin.
Syncing between OneLogin and Sumo Logic
When you modify the name, email, or role of a user assigned the app in OneLogin, the changes will be synced to the corresponding user in Sumo Logic.
If you unassign a user from the app in OneLogin, the corresponding user is deactivated in Sumo Logic. (If you later try to reassign that same user to the app, it will result in an error in Sumo Logic. You must delete the old user from Sumo Logic first so that the user can be provisioned once again from OneLogin.)