Centralise artifact access control with Okta
Cloudsmith connects directly to your Okta organisation via SAML 2.0 SSO and SCIM 2.0 provisioning, so your identity policies govern artifact access from day one. Map Okta groups to Cloudsmith teams, automate user lifecycle management, and enforce SAML-only authentication across every repository your engineers touch.
How we support Okta
Why teams integrate Cloudsmith with Okta
Frequently asked questions
Cloudsmith supports SAML 2.0 for single sign-on with Okta. You configure Okta as your SAML identity provider and provide the IdP metadata XML to Cloudsmith. SCIM 2.0 is also supported for automated user and group provisioning.
Create a Cloudsmith application in Okta, configure the SAML settings, then copy the IdP metadata XML from the Sign On tab and paste it into your Cloudsmith workspace authentication settings. Full step-by-step instructions are in the Cloudsmith Okta documentation.
Yes. Cloudsmith is SCIM 2.0-compliant. Enable SCIM in your Cloudsmith workspace settings, then configure the Cloudsmith application in Okta to use SCIM. You can then automatically provision new users, deprovision leavers, and sync profile updates from your Okta directory.
Yes. SAML Group Sync lets you map Okta Group Attribute Statements to Cloudsmith teams. Configure the group attributes in your Okta application, then create the corresponding group sync mappings in Cloudsmith. Users are assigned to the correct team and role on login.
Yes. Once SAML is configured, you can enable SAML-only authentication in your Cloudsmith workspace settings. This removes the ability to log in with local credentials, ensuring every access event goes through your Okta identity provider.
With SCIM provisioning enabled, deprovisioning a user in Okta automatically revokes their Cloudsmith access in real time. Without SCIM, SSO-only configurations still prevent login, but SCIM ensures the account is fully removed from your workspace.
You can use SAML SSO on its own for authentication, and add SCIM separately for lifecycle management. Most teams benefit from running both together: SAML handles authentication and SCIM keeps user accounts and group memberships in sync.
Yes. Every action in Cloudsmith is logged against the authenticated user identity, regardless of whether they authenticated via SAML, SCIM, or API key. The audit log shows package events, permission changes, and login activity, all tied to the individual Okta user.
SAML SSO and SCIM provisioning are available on Okta plans that support these protocols. Okta's SSO features are available from their standard Workforce Identity plans. Check your Okta subscription for specific feature availability.
Yes. You can configure and test SAML and SCIM in Cloudsmith before enforcing SAML-only authentication. This lets you verify that group sync and provisioning are working correctly before cutting over, so your team can keep accessing Cloudsmith throughout the migration.