Identity management requests are among the most frequent tasks in IT Service Management. Every day, support teams handle user access changes be it from onboarding new employees to updating group memberships because of an organization change. It's all managed through service desk tickets that require careful review and approval. Integrating an identity provider like Okta with Jira Service Management (JSM) can reduce the processing time for these type of tickets. In this blog, we’ll explore common identity-related ITSM use cases, see how Assets help meet these needs, walk through how to synchronize Okta data into Assets (using the OnLink).
Its not uncommon for IT support teams faced with a high volume of access and account-related requests. These routine tasks are crucial for security and productivity, yet they consume substantial support effort when handled manually. Some of the most common ITSM tickets related to Okta include:
Each of these requests typically goes through JSM as a ticket, often with approvals and manual steps by IT staff. Automating such use cases frees up support teams to focus on high-value tasks.
Imagine Assets is pre-populated with users, roles, groups, devices from Okta.
You might wonder why is this valuable? Please allow me to explain.
When an ticket is opened (e.g, “Add this user to the Marketing Okta group”), the support agent can quickly look up the current roles, group memberships, and other attributes of that user in Assets without switching to the Okta admin console. Having the employee’s profile, role assignments, group memberships, and even device information readily available in JSM speeds up triage and resolution. IT teams can validate access rights on the fly and ensure compliance with corporate policies.
In summary, Assets to the rescue: by syncing identity data from Okta into Assets, JSM becomes a one-stop hub for user information. This integration enables automated checks and smarter workflows (for example, auto-approving requests that meet certain criteria), cuts down manual effort, and improves service response times . It enhances security too, ensuring that any changes are made based on up-to-date data about the user’s current access . The support desk can confidently address identity-related tickets with full context, leading to quicker and more accurate resolutions.
Now, let’s discuss how to get your Okta identity data into JSM’s Assets and keep it in sync. OnLink make this integration straightforward by automating data import from Okta to Assets. Below is a step-by-step guide to configure the Okta–JSM Assets connection and set up automated synchronization of users, groups, roles, and devices.
Before importing data, you need to establish a connection between JSM and Okta:
Next, configure Assets to receive data from Okta:
In the OnLink configuration interface, you’ll set up field mappings that tell OnLink how to translate Okta’s user data into Assets object attributes. OnLink will have already detected which Assets schema and object type you intend to import into – make sure it’s pointing to your “User” object type (or equivalent) in Assets.
Now, define the mappings. Each mapping is a simple line that maps a field from Okta to an attribute in Assets. For example, a basic user profile mapping might look like this:
key:id=WorkerID
map:profile.email=User
map:profile.firstName=First Name
map:profile.lastName=Last Name
map:profile.managerId=Manager UserID
map:profile.manager=Manager Name
map:profile.department=Department
Let’s break down what this means:
map:profile.department=Department – Maps the department field from Okta to a Department attribute in Assets (which might be a reference to a Department object or simply a text field for department name).
In Okta, each user can belong to multiple groups, have various roles, and be assigned to applications. It’s incredibly useful for the service desk to see these access entitlements in JSM Assets as part of the user’s record. With OnLink, you can pull those lists in as well.
Okta’s API provides arrays for a user’s groups, roles, and apps. We can map those arrays into Assets by leveraging Assets object references. Suppose you have separate object types in Assets for Roles, Groups, and Apps (with attributes like “Name” to identify each). You can configure the mapping to populate those relationships as follows:
key:id=Username
map:profile.firstName=Firstname
map:profile.lastName=Lastname
map:roles=Roles|Name=${roles}
map:groups=Groups|Name=${groups}
map:apps=Apps|Name=${apps}
config:section=roles,groups,apps
Here’s what this does:
The previous step linked users to group and app objects by name, but you might also want to import additional details about each Group or Application from Okta. OnLink allows you to pull data from any Okta API endpoint by adjusting the configuration. We can set up separate imports (or additional mapping sections) for Okta’s Groups API and Apps API to populate the Assets Group and App object types more fully.
For example, to import all Okta groups into Assets (object type “Group”), you could use a configuration like:
Groups:
key:id=Group ID
map:profile.name=Group Name
map:profile.description=Group Desc
config:data_source=/api/v1/groups
And for Okta applications (object type “App”):
Apps:
key:id=App ID
map:label=App Name
config:data_source=/api/v1/apps
In these snippets, we use config:data_source= to specify a different Okta API endpoint. By default, OnLink was calling the /api/v1/users endpoint for user data . By pointing to /api/v1/groups, we tell it to retrieve all groups. We map the group id to a unique “Group ID” in Assets, and map the group’s name and description to attributes in the Group object (like “Group Name” and “Group Desc”). Similarly for apps, using the app id and label (application name).
Aside from users and groups, Okta can also store information about devices (if you use Okta’s device management or endpoint identity features). For instance, Okta’s Devices API can list devices (like enrolled laptops or phones) and link them to users. Integrating device data into JSM Assets can be extremely useful for service desk tasks (as one of the most frequent IT requests involves hardware issues ).
Using OnLink, you can retrieve device records from Okta much like we did for users. Okta’s devices endpoint requires a slightly different call – here’s an example mapping configuration for devices:
Devices:
key:id=DeviceID
map:profile.displayName=Device Name
map:profile.platform=Device Platform
map:profile.manufacturer=Device Manufacturer
map:profile.model=Device Model
map:profile.osVersion=Device OS Version
map:_embedded.users.0.user.profile.firstName=First Name
map:_embedded.users.0.user.profile.lastName=Last Name
map:_embedded.users.0.user.profile.email=Email
config:data_source=/api/v1/devices?limit=200&expand=userSummary
Breaking this down:
The lines with _embedded.users.0.user.profile... are mapping data about the user associated with the device. Okta’s device API embeds the user info for the primary user of the device (under a userSummary). In this example, we map the first name, last name, and email of the embedded user to the Device object’s attributes for owner’s name and email. Alternatively, you might map the user’s email to a user-type attribute to directly link the Device object to the User object in Assets.
👉 Try OnLink today to connect Okta with Jira Service Management. If you’re using Okta as your identity provider and JSM for your ITSM, OnLink can bridge the two by importing your Okta data into Assets and enabling automation for identity-related tickets. With a few clicks, you can set up the sync and start resolving access requests faster and more effectively. Please give it a try and let us know your feedback.
Prabhu Palanisamy _Onward_
President
Onward
Ashburn, VA
3 accepted answers
0 comments