Skip to main content

User Imports

Motadata allows you to import users belonging to different servers, for example, AD users, Okta users, etc.

Motadata ServiceOps establishes a connection with the services using the provided information and fetches employee details from the server into the system.

To view the User Imports page, navigate to the Admin > Users > SSO Configurations > User Imports tab, and the page appears.

User Import List page

The page provides the following features:

  1. Search: You can search for the required service using the keywords.
  2. Add User Import: You can import users.
  3. Grid: Displays the details of the import.
  4. Schedule Enabled: You can enable or disable the schedule.
  5. Show History: You can view the user import history for each Identity Provider individually.
  6. Import Users: You can import the users of the desired identity provider into ServiceOps.
  7. Scheduler: You can create a schedule for each Identity Provider individually, based on which the users will get synchronized.
  8. Edit: You can edit the configurations.
  9. Delete: You can delete the configuration if required.

Add User Import

To configure import,

  1. Click the Add User Import button and the popup appears.

Add User Import

  1. Enter the following details:
  • Name: Enter the name of the user import.
  • Enabled: Enable the functionality. By default, it is disabled.
  • SSO Provider: Select the provider of SSO functionality. The options are: Okta, One Login, Azure AD / Office 365, Key Cloak, and Google Workspace. Based on this, the parameters will appear in the Configuration tab.
  • Identity Provider: Select the identity providers whose users you want to import. For more details, refer to Identity Providers.
  • Proxy Server: Select the proxy server.
  • Block missing users (If not blocked, missing users will be deleted): If enabled, missing users will be blocked; if disabled, they will be archived. This setting allows blocking or archiving users based on their status in each identity provider:
    • KeyCloak, OneLogin, and Azure: Deleted
    • Okta: Deactivate
    • JumpCloud: Deleted or Suspended Users with the above statuses will be automatically blocked in ServiceOps during import. If reactivated in the identity provider, they will be unblocked in ServiceOps on the next sync.
note
  • Users archived in ServiceOps due to the Identity Provider will not be automatically un-archived.
  • Here, you can import both Azure AD and Office 365 users.
  • Office 365 uses Azure Active Directory for user management; hence, the configurations for both services are identical.
  1. In the Configuration tab, configure the details as per the selected SSO Provider:

For Azure/Office 365

  • Client ID: Enter the Client ID copied from Azure.

  • Client Secret: Enter the Client Secret copied from Azure.

  • Tenant ID: Enter the Tenant ID copied from Azure.

    To obtain the Client ID, Client Secret, and Tenant ID details, follow these steps:

    1. Sign in to the Microsoft Azure portal.

    2. In the Azure services section, click Azure Active Directory > App Registration, and select the SSO App created from the Enterprise Application for Identity Providers.

      App Registration

    3. Once selected, the overview page appears.

      App details

      Copy the Client ID and Tenant ID and paste them in ServiceOps.

    4. Next, go to Manage > API Permissions tab, and click Add a permission to add permissions for the application.

      1. The Request API Permissions popup appears. Click Microsoft Graph.
      2. In the Delegated Permissions tab, search for Directory, and select the below permissions:
        • Directory.AccessAsUser.All
        • Directory.Read.All
      3. Once done, click Add permissions.

      Delegated permissions

      Similarly, in the Application permissions tab, select the Directory.Read.All permission as shown below.

      Application permissions

    5. Click Grant admin consent for mtdt to grant the admin consent for the requested permissions.

      Grant admin consent

    6. Next, go to Certificates & secrets > Client Secrets tab, and click New client secret. The following popup appears.

      Client secret

    7. Enter the description, select the expiry, and click Add. The client secret will appear on the screen. Copy it and use it in ServiceOps.

      client secret

  • Group Filter: Enter the group name whose users you want to import from the Azure AD. The group name should be same as that provided in the Azure AD portal. For example, in the below figure, "All Users" Group name is configured in the ServiceOps Portal.

note

Once the group is configured, users belonging to this group only will be imported.

Group Filter

Group Filter

  • Add Notification Email: Add the email address of the users who should be notified about the import.

For Okta

  • API Key: Enter the OKTA client’s API Key (API Token). To generate the token,
    • In the OKTA client, click the menu icon, and navigate to the Security > API > Tokens tab.

Tokens Tab

  • Click Create Token button, and a popup appears.

Create Token

  • Enter a name for the token and click Create Token. A popup displaying the created token appears as shown below:

Create Token

  • Copy the token and use it in the API Key field.
note
  1. The token appears only once at the time of creation. Hence, it is recommended to save the token locally for future use.
  2. Tokens are valid for 30 days from creation or last use, so the validity automatically gets refreshed with each API call. Tokens that remain unused for 30 days expire.
  • Domain URL: Enter the domain URL of the OKTA client.
  • Group Filter: Enter the Group name available in OKTA whose members you want to import.
  • Add Notification Email: Add the email address of the users who should be notified about the import.

For One Login

  • Client ID: Paste the Client ID copied from the One Login portal.
  • Client Secret: Paste the Client Secret copied from the One Login portal.
  • Domain URL: Enter the Domain URL of the one login.
  • Group Filter: Enter the Group Filter whose users you want to import from the OneLogin.
  • Add Notification Email: Add the email address of the users who should be notified about the import.

OneLogin Details

For Key Cloak

  • Client ID: Enter the Client ID. You can get the client id from the Key Cloak, as shown below.

Client ID from Key Cloak

  • Client Secret: Enter the Client Secret. You can get these details from Key Cloak, as shown below.

Client Secret from Key Cloak

  • Domain URL: Enter the domain URL of the Key Cloak client.
  • Group Filter: Enter the Group whose users you want to import from the Key Cloak.
  • Realms: Enter the realms name created in Key Cloak.
  • Add Notification Email: Add the email address of the users who should be notified about the import.

For JumpCloud

  1. Navigate to Admin > Users > SSO Configuration > User Imports tab and click Add User Import. The following popup appears.

  1. Enter the below details:
  • Name: Enter the name of the user import.
  • Enabled: Enable the functionality.
  • SSO Provider: Select the provider of SSO functionality.
  • Identity Provider: Select the JumpCloud Identity provider whose users you want to import.
  • Proxy Server: Select the proxy server to be used.
  1. In the Configuration tab, configure the details from the JumpCloud portal.
  • API Key: Copy and paste the API key generated from the JumpCloud portal. To generate the API Key, click the username in the JumpCloud portal on the screen's top-right corner and select the My API Key option.

    note

    The API key generated will be valid for 24 hours only. After this period, you will need to generate a new key.

    Once selected, click the 'Generate New API Key' button, copy the generated API Key, and paste it into ServiceOps.

  • Tenant ID: Copy and paste the Tenant ID (Organization ID) from the JumpCloud portal into ServiceOps. You can get it from Settings > Organization Profile tab.

  • Group Filter: Enter the username of the user group whose users you want to import in ServiceOps.

  • Add Notification Email: Add the email address of the users who should be notified about the import.

  1. In the Mapping tab, map the fields that you want to import as shown below:

Import Users Mapping

  • In case of Key Cloak, it provides limited user details. Hence, to map additional fields, you need to create custom fields in Key Cloak. To do so, select the required realm, and navigate to Users > User (Rosy) > Attributes tab. In this case, Realm is Serviceops.

Creating Custom Fields in the Key Cloak client

Enter the Key name and value in the table, and click Add. You can now use this field to map by adding the prefix “attributes.” to the key name.

  • In case of JumpCloud you can map up to five attributes, separated by commas, in the Email and Username fields. The system checks each attribute sequentially; if one value is blank, it moves to the next. The priority is determined by the order in which attributes are added.
  1. Once all the details are filled, you can check the connectivity by clicking the Test Connection button.

  2. Once the connection is successful, click Add, and the imported users will get added as requesters in the ServiceOps as shown below:

AzureAD Imported Users

For Google Workspace

The process involves creating credentials in the Google Cloud Console and then establishing the connection within the User Import settings.

Prerequisites

Before you begin, ensure you have the following:

Part 1: Configure Google Cloud Console

Follow these steps to create the necessary credentials for the integration.

Step 1: Create a New Project

  1. Navigate to the Google Cloud Console.

    Create a new project in Google Cloud Console

    Create a new project in Google Cloud Console

  2. Click the project dropdown in the top navigation bar and select New Project.

    Enter project name and create

  3. Enter a descriptive Project name (Example, SSO Google Workspace) and select an organization (Example, motadataserviceops.com) if applicable.

  1. Click Create.

Step 2: Enable Required APIs

  1. In the newly created project, navigate to APIs & Services > API Library from the main menu. Navigate to API Library
  2. Search for and enable the Admin SDK API. Enable Admin SDK API

Step 3: Configure the OAuth Consent Screen

  1. Navigate to APIs & Services > OAuth consent screen. Click Get Started. Navigate to OAuth consent screen

  2. Fill in the required application details, like App Name (SSO Sync) and Support User email.

  3. Once done, click Next and select the Audience as External for the User Type and click Next.

  4. In the Contact Information section, enter the contact email address.

  1. Agree to the Google API Services User Data Policy and click Continue.

  1. Click Create.

Step 4: Create OAuth Credentials

  1. Once the application details are filled, you will be redirected to the following screen. Click Create OAuth client.

  1. From the Application type dropdown, select Web application.

  1. Enter the Application name.

  1. Under Authorized redirect URIs, click Add URI and enter the callback URL for your instance.
    • Syntax: https://{your-server-url}/oauth/callback
    • Example: https://motadata.serviceops.com/oauth/callback

  1. Click Create.

Step 5: Add Scope

  1. Navigate to the Data Access tab, click the Add or Remove Scopes, and manually add the following scopes.

    https://www.googleapis.com/auth/admin.directory.user.readonly
https://www.googleapis.com/auth/admin.directory.group.readonly
https://www.googleapis.com/auth/admin.directory.userschema.readonly
  1. Click Update, and then Save and Continue.

Step 6: Copy Your Credentials

  • A confirmation screen will appear displaying your Client ID and Client Secret.

  • Copy these values and store them securely. You will need them to configure the application in the next part.

Part 2: Configure ServiceOps User Import

Step 1: Navigate to User Import Settings

  1. Log in to the ServiceOps portal.
  2. Go to Admin > Users > SSO Configuration > User Imports.
  3. Click Add User Import.

Step 2: Enter Google Workspace Details

  1. In the SSO Provider dropdown, select Google Workspace.

  2. Fill in the configuration fields:

    • Client ID: Paste the value you copied from the Google Cloud Console.
    • Client Secret: Paste the value you copied from the Google Cloud Console.
    • Filter Users by Domain: Enable to restrict user import to a specific domain only within your organization. Once enabled, enter the Domain URL. You can find this in the Google Admin console. For example, if motadataserviceops.com is entered, only users from this domain will be imported.

note

Filtering by group name is not supported. You must use the full group email address.

  • Notification Email: Enter the email address to receive notifications about the sync status.

  1. Click Add. A consent screen will open for you to authorize your Google account. This step is mandatory before you can proceed.

  1. Select the google account for authentication and click Allow.

  1. Verify the connection using the Test Connection button.

Step 3: Configure Field Mapping

  1. Once verified, the Mapping tab will become available.

  1. Map the fields from Google Workspace to the corresponding fields in ServiceOps.
note
  • Custom Fields: Only single-valued custom fields from Google Workspace can be mapped. Multi-valued fields are not supported.
  • Deleted Fields: If a mapped custom field is deleted from Google Workspace, the mapping will become invalid. You must remove or update it in ServiceOps to ensure data populates correctly during import. The system will highlight invalid mappings as shown below.

Step 4: Finalize and Run the Import

  1. Configure any necessary Proxy Server settings.
  2. Set the Block missing users option as needed.
  3. Click Save.
  4. To run the import, select your new configuration from the list and click Import Users. You can also set a Schedule for automatic synchronization.

  1. Once the Import process is completed, the users will appear in the Requesters list as shown below.

  1. You can also view the user Import History to view the details as shown below.

Show History

Once the users are imported, you can view its history by clicking the Show History icon in the Actions column next to the created import. It displays the details like SSO Provider, Created Date, Total Fetched Users, Total Created Users, Total Failed Users, Total Blocked/Deleted Users, Total Unblocked Users, and Total Updated Users.

Show History

Additionally, you can view the list of users created, failed, blocked, and unblocked by clicking on the count link as shown below.

Show History

Also, you can export the list of users in CSV and Excel Format. Moreover, the excel file can be password-protected.

Import Users

Click the Import Users icon in the Actions column to import the users from the desired server to ServiceOps. Once clicked, the imported users get added as requesters in the ServiceOps as shown below.

Import Users

Create Schedule

Scheduling allows you to periodically import employee details from the server. This feature helps you to keep the Requesters list up to date.

To create a schedule,

  1. From the list page, click the Scheduler icon in the Actions column. A popup appears.

Scheduler

  1. Enable the scheduler.
  2. Select the Schedule Type. The options are:
    • Once: If selected the schedule will run only once as per the start date selected in the Start At field.
    • Daily: If selected the schedule will run daily as per the Start At and Time selected. The Start At field depicts the date and time when the schedule should start.
    • Weekly: If selected the schedule will run weekly as per the Start At, Day, and Time selected. The Start At field depicts the date when the schedule should start. Day depicts the day on which the schedule should run.
    • Monthly: If selected the schedule will run once in a month as per the Start At, Date, Time, and Month(s) selected. The Start At field depicts the date when the schedule should start. Date is the date of the month on which the schedule should run.
  3. Once done, click Update to save the schedule.