# IAM

Tessell’s Identity and Access Management (IAM) application under the Governance app family helps you securely control access to Tessell applications. It lets you define user personas that enable the privileges and accesses to an user under that persona. You can create your own custom personas and add the access to applications as per your need. Identity providers like Microsoft Entra ID and Okta can be configured to manage user life cycle.

***

### Prerequisites

Ensure that you have registered your cloud subscription and added your network details in the Subscriptions application under the Governance app family.

For more information on cloud subscriptions, see [Subscriptions](https://docs.tessell.com/tessell/governance/subscriptions).

***

### Users

On the left navigation pane of Tessell portal, select IAM under Governance to view the IAM dashboard. It consists of three tabs, Users, Personas, and Identity Providers.

The Users tab displays a comprehensive list of users, describing their assigned personas, authentication modes, associated subscriptions, and current status.

The Users tab includes the following filters:

* **Search** - Specify a name of the user to search for a specific user in the search bar. As you type, the list automatically filters and displays user names that match the characters you specify.
* **Subscription** - You can choose a cloud subscription from the dropdown list. By default, all the subscriptions are displayed. The possible values are ‘All’ or any specific subscription.
* **Personas** - You can choose a user persona from the dropdown list. By default, all the personas are displayed. The possible values are All, Account Owner, Administrator, Data Owner, Infra Admin, or any custom persona.
* **Status** - You can choose a status from the dropdown list. By default, all the statuses are displayed. The possible statuses are All, Active, Invited, or Inactive.
* **Clear** - Select this to clear the selected filters and revert back to default settings.

#### Invite User

To reduce the administrative efforts to create a new user each time with user’s information, Tessell provides an **Invite User** feature where an administrator with IAM app access can invite users using their email id, and select persona and subscriptions. Invited users can then use  email received from the administrator to specify their details and login to the Tessell portal using their preferred authentication mode.

To invite a user:

1. On the top-right corner of the window, click **+ Invite User**.

   The ‘Invite a new user’ dialog box opens.
2. Specify the email address of the user in the **Email** field.
3. From the **Persona** dropdown list, choose a persona.

   Notice the change in number of applications assigned for a persona when you change a persona.&#x20;
4. To view the associated applications, click **View all N apps**, where N is the number of applications assigned.
5. Search for a specific subscription to assign in the **List of subscriptions** field.
6. All the subscriptions are listed below the search field, select from the list to assign.
7. To select all subscriptions, select the check box **Select all**.
8. Click **Invite** to send an invite mail to the user.

After the required fields are filled, use the code as an alternative method to invite a user.

1. Use the **Code** button from the bottom left corner of the dialog box to view the code in different languages like Shell, Python, Go, Java, Javascript, and PowerShell.&#x20;
2. You can copy or download the code using the respective buttons in the top-right corner.
3. Use the **Close** button at the bottom right corner to return back to the main window.

The fields in the Users table provide following information:

* **Name** - Displays the name of the user provided during their initial login to the Tessell portal. It also displays the email ID of the user below the name.
* **Persona** - Displays the user's assigned persona, which is set by the administrator either during the initial invitation or after the user joins the portal.&#x20;
* **Authentication Mode** - Displays the authentication mode used by the user during their initial login. It can be Email, Google, Microsoft Entra ID, or Okta.
* **Subscriptions** - Displays the subscriptions assigned to the user. Account owners are assigned all subscriptions. Administrators assign subscriptions to other personas during the initial invitation, and these are displayed under this column.
* **Status** - Displays the user’s current status. Statuses can be Active, Invited, or Inactive.
* **Ellipsis icon** - Click the ellipsis icon to perform following actions:
  * **Disable** - This option is available when the user’s status is active. To disable, click this option and confirm your choice in the confirmation pop-up. After the user is disabled, they cannot access the Tessell portal.&#x20;
  * **Enable** - This option is available when the user's status is inactive. To enable, click this option and confirm your choice in the confirmation pop-up. After the user is enabled, they can access the Tessell portal. &#x20;

    **Note**:&#x20;

    * You cannot enable or disable your own status.
    * If you have used Microsoft Entra ID or Okta for authentication, enabling and disabling is managed in the respective identity provider’s portal.
  * **Change Persona** - This option allows you to change the user’s persona to any other available persona’s.&#x20;
    * To change a persona, click this option and select a persona from the list.

      The ‘Change Persona’ dialog box opens.
    * When downgrading to a persona with fewer privileges, users lose access to some privileges associated with their previous higher-privileged persona.
    * To downgrade, you have to transfer the ownership of the servers if they were available in a higher-privileged persona. Also, remove the user from the co-owner roles of the servers that were in higher-privileged persona.
    * Click **Submit** to change persona.
  * **Grant/Revoke admin access to database services** - Account owners can grant or revoke administrative access to database services. This functionality applies to all personas except the account owner themselves.

<p align="center"><strong>Figure 1: IAM application Users tab</strong></p>

<figure><img src="https://3421475909-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXNKiIctERJykfezXfUU2%2Fuploads%2F17lX0WcUtt2IX6rkUGDm%2Funknown.jpeg?alt=media&#x26;token=d13d6a96-753e-4c33-a045-df8a74aef4b7" alt=""><figcaption></figcaption></figure>

***

### Personas&#x20;

The Personas tab in the IAM application provides a comprehensive overview of both default and custom personas. It allows you to view the applications assigned to each persona. You can also create custom personas as per your need.

#### Default Persona

Tessell provides four default personas Account Owner, Data Owner, Administrator, and Infra Admin. Default personas have a set of pre-defined applications in them, you cannot add applications in default personas.

* **Account Owner** - This persona has access to all the applications in all the app families.
* **Data Owner** - This persona has access to the applications in the DB Services app family.
* **Administrator** - This persona has access to the applications in the DB Services app family and the following applications.
  * Infrastructure Management app family
    * Servers
    * Monitoring Perf Insights Infra
  * Governance app family
    * Compute
    * Networks
    * DB Governance
  * Support app family
    * Tickets
* **Infra Admin** - This persona has access to the applications in the DB Services app family and the following applications.
  * Infrastructure Management app family
    * Servers
    * Monitoring Perf Insights Infra
  * Governance app family
    * Compute
    * DB Governance
  * Support app family
    * Tickets

#### Custom Persona

If the default personas do not meet your requirements, you can create a custom persona, allowing you to select the specific applications you need.

**Create a Custom Persona**

To create a custom persona,

1. Click the **+** plus icon (Create a Custom Persona) at the end of the personas list.

   The ‘Add persona’ dialog box opens.
2. Specify the name of the custom persona in the **Name** field.
3. Optionally, specify a description for your custom persona.
4. Select the apps from their respective app family.

   When you select an app, the color of the app turns to blue from grey.
5. Click **Add** to create a new custom persona.

Click the ellipsis icon on any custom persona to access the options Update and Delete.

* **Update** - Use this option to add or remove the apps from a custom persona. Also, you can update the description of the persona. To update, select the apps and update the description and then click **Update**.
* **Delete** - Use this option to delete a custom persona. To delete, select this option and a confirmation dialog box is displayed to confirm your choice, and then click **Delete**.

As an alternative method, use the code to create a custom persona.

1. Use the **Code** button from the bottom left corner of the dialog box to view the code in different languages like Shell, Python, Go, Java, Javascript, and PowerShell.&#x20;
2. You can copy or download the code using the respective buttons in the top-right corner.
3. Use the **Close** button at the bottom right corner to return back to the main window.

<p align="center"><strong>Figure 2 - IAM application Personas tab</strong></p>

<figure><img src="https://3421475909-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXNKiIctERJykfezXfUU2%2Fuploads%2FUOswpYwynOXF9iZ1RqnE%2Funknown.png?alt=media&#x26;token=755b9993-2d4b-4a6c-b84d-9793e6939ae8" alt=""><figcaption></figcaption></figure>

***

### Identity Providers

Tessell offers configuring identity providers like Microsoft Entra ID and Okta to manage users. This is useful when you already have Microsoft Entra ID or Okta as identity providers and would like to import them to Tessell. In this case, authentication of the users is done with your identity provider.

To enhance the security of user accounts, Tessell supports multi-factor authentication via Email. This feature is not enabled on the portal by default; to use it, please contact Tessell support.

#### Microsoft Entra ID

**Microsoft Entra ID (IDP) Configuration**

1. On the Azure portal, under **Enterprise Applications**, create a new application for Tessell.

<figure><img src="https://3421475909-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXNKiIctERJykfezXfUU2%2Fuploads%2FUE5ZsRzTDfhf3s81Q8vw%2Funknown.png?alt=media&#x26;token=799eada2-0511-4a0c-ad26-134100b02a25" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3421475909-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXNKiIctERJykfezXfUU2%2Fuploads%2FNey377GEgs4EKHWu84Ma%2Funknown.png?alt=media&#x26;token=15e7eb1b-8cc4-47a2-97da-0694a0425bce" alt=""><figcaption></figcaption></figure>

2. Add Entra users to the newly created app. These are the users that should have access to Tessell.&#x20;
3. To set up single sign on, select **Set up single sign on** section to configure the IDP side of SSO configuration in the app.

<figure><img src="https://3421475909-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXNKiIctERJykfezXfUU2%2Fuploads%2FiNUOkkdvmILiBuZBf4oa%2Funknown.png?alt=media&#x26;token=81798fb7-00e9-4e92-b48e-3ca6cdc4b922" alt=""><figcaption></figcaption></figure>

3. Tessell requires the admin to configure three Tessell related fields in the new app’s SSO configuration. Fetch the values for these fields from Tessell portal. They are located in the IAM app under **Identity Providers**.

<figure><img src="https://3421475909-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXNKiIctERJykfezXfUU2%2Fuploads%2FjOgY251s7eAzEiqyj1Aw%2Funknown.jpeg?alt=media&#x26;token=0111f647-4251-49ae-970d-6ef30be47a72" alt=""><figcaption></figcaption></figure>

4. Configure below fields in the Azure app under **Basic SAML** Configuration.&#x20;
   * Identifier (Entity ID)
   * Reply URL (Assertion Consumer Service URL)
   * Sign on URL

<figure><img src="https://3421475909-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXNKiIctERJykfezXfUU2%2Fuploads%2FXUcqJ6bNtBxEJkmNtnE5%2Funknown.png?alt=media&#x26;token=4046cd20-bc82-459b-88f3-c43532c891ae" alt=""><figcaption></figcaption></figure>

5. Leave the **Attributes & Claims** as the preset defaults.

**Tessell (SP) Configuration**

Perform the following configuration steps in the Tessell UI.

1. For each app, Microsoft generates a unique login URL, identifier, and certificate to access the app. These must be copied from the Azure app to Tessell.

<figure><img src="https://3421475909-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXNKiIctERJykfezXfUU2%2Fuploads%2FYunWcSBR68LeXq5QbZWl%2Funknown.png?alt=media&#x26;token=f8228a4b-7102-4258-be06-d127ffb7ce8c" alt=""><figcaption></figcaption></figure>

2. The above fields must be configured in Tessell under the IAM app. In Tessell UI, go to **Governance** > **IAM** > **Identity Providers** > **Microsoft Entra ID**.

<figure><img src="https://3421475909-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXNKiIctERJykfezXfUU2%2Fuploads%2Fn9vs5C49X2WRUltUx3YR%2Funknown.png?alt=media&#x26;token=790b1ebb-c5ae-406e-9071-4b46817e8f4e" alt=""><figcaption></figcaption></figure>

3. After Tessell is configured with the IDP details, the last step is to invite the Entra users to Tessell. You can invite users to Tessell in Tessell’s IAM app (as shown below). Please ensure users invited to Tessell are also added to the Tessell enterprise application in Azure.

<figure><img src="https://3421475909-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXNKiIctERJykfezXfUU2%2Fuploads%2FCJOO9Ebabz6tX4kNbWh1%2Funknown.png?alt=media&#x26;token=cb6c390a-91d2-42f6-ad1c-8e39cfe3e201" alt=""><figcaption></figcaption></figure>

***

#### Okta

**Okta configuration**

1. Navigate to the Okta admin console and create an app.

<figure><img src="https://3421475909-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXNKiIctERJykfezXfUU2%2Fuploads%2Fc1pIALlIX61CHh7UbKQO%2Funknown.png?alt=media&#x26;token=f19a4612-9314-4946-ada6-049cbc5bf785" alt=""><figcaption></figcaption></figure>

&#x20;

2. Use the SAML 2.0 protocol while creating an app. This is the only protocol supported by Tessell.

<figure><img src="https://3421475909-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXNKiIctERJykfezXfUU2%2Fuploads%2F1MUiq2UjzfDCrken0GmU%2Funknown.png?alt=media&#x26;token=123be400-eed4-4959-aa98-1aa12c4e390e" alt=""><figcaption></figcaption></figure>

3. Add an optional icon and add a mandatory name as Tessell in the app.
   1. Download and use below logo:

<figure><img src="https://3421475909-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXNKiIctERJykfezXfUU2%2Fuploads%2Fi3pBtzD6z45GqQeovs0m%2Funknown.png?alt=media&#x26;token=266289fb-0b3c-4d03-bcee-6b3797333402" alt="" width="188"><figcaption></figcaption></figure>

<figure><img src="https://3421475909-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXNKiIctERJykfezXfUU2%2Fuploads%2F5icwiVK5Ht6jhXKQmmoz%2Funknown.png?alt=media&#x26;token=f25d42a1-76a1-430b-8d45-cca997bfe94e" alt=""><figcaption></figcaption></figure>

&#x20;

4. Now log in to Tessell as Account Owner and go to Identity Providers.&#x20;
   1. Click **Okta** > **Configure**.&#x20;
   2. Note down the Entity ID, SSO URL, and SCIM Base URL.

<figure><img src="https://3421475909-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXNKiIctERJykfezXfUU2%2Fuploads%2F7mUAARIUDmCJErGAlzEC%2Funknown.png?alt=media&#x26;token=b0089a88-a80d-4d6f-b8b3-97677a0560e6" alt=""><figcaption></figcaption></figure>

5. Add the Entity ID and SSO URL noted in step 4.

<figure><img src="https://3421475909-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXNKiIctERJykfezXfUU2%2Fuploads%2FtoeIlthZwTLAqvO5qxVn%2Funknown.png?alt=media&#x26;token=53eefea6-2643-4af3-9114-c737978cdb81" alt=""><figcaption></figcaption></figure>

6. Add firstName, lastName, and email attributes mapping.

<figure><img src="https://3421475909-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXNKiIctERJykfezXfUU2%2Fuploads%2FjAVhOPuMPk9c5u2Fmafy%2Funknown.png?alt=media&#x26;token=4e6502cd-f027-4a91-bc5c-dcd9dd5295d0" alt=""><figcaption></figcaption></figure>

7. Use the options and complete the app creation in Okta.

<figure><img src="https://3421475909-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXNKiIctERJykfezXfUU2%2Fuploads%2FTl4ao52oiXmPtc5ieela%2Funknown.png?alt=media&#x26;token=57550c6d-26e0-4ded-a979-a51b7e52e121" alt=""><figcaption></figcaption></figure>

8. On the Sign On tab, change the **Application username** **format** to Email.

<figure><img src="https://3421475909-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXNKiIctERJykfezXfUU2%2Fuploads%2FGanJvdlhSjMqI6lNqc84%2Funknown.png?alt=media&#x26;token=831039ce-6bc5-4bb7-aedf-46190ed2b5d8" alt=""><figcaption></figcaption></figure>

9. Go to the General tab of the app and enable SCIM provisioning.

<figure><img src="https://3421475909-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXNKiIctERJykfezXfUU2%2Fuploads%2FrqxtPo54Q8qqooYtqkrW%2Funknown.png?alt=media&#x26;token=be42f476-2ee7-4bfb-85d2-4ee035ca29da" alt=""><figcaption></figcaption></figure>

10. The provisioning tab starts showing up now.

<figure><img src="https://3421475909-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXNKiIctERJykfezXfUU2%2Fuploads%2FWqoxkzkQe995jWEgmwtF%2Funknown.png?alt=media&#x26;token=f8d59ae2-2d13-417c-9454-b25c336f7957" alt=""><figcaption></figcaption></figure>

11. Go to Tessell API key as an Account Owner and create an API key that never expires.

<figure><img src="https://3421475909-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXNKiIctERJykfezXfUU2%2Fuploads%2FAshB8XOaXDdCr14h6U54%2Funknown.png?alt=media&#x26;token=57ae3196-7566-4b3c-a476-5f78218190e5" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3421475909-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXNKiIctERJykfezXfUU2%2Fuploads%2F7WVb8KopsKJsw5HOk8Wv%2Funknown.png?alt=media&#x26;token=203cac3c-0596-4d2f-93ad-823226c8e59e" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3421475909-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXNKiIctERJykfezXfUU2%2Fuploads%2FYJsSOfJX4Cc436xZXNXN%2Funknown.png?alt=media&#x26;token=491dee2f-0103-46e6-9142-1eaed5227d32" alt=""><figcaption></figcaption></figure>

12. Edit the SCIM provisioning in Okta and add the details.&#x20;
    1. Select Authentication type as Bearer and add the API key generated in Tessell.&#x20;
    2. Add the SCIM endpoint noted in step 4.

<figure><img src="https://3421475909-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXNKiIctERJykfezXfUU2%2Fuploads%2F92DPShF3IxSZHJCzFQbd%2Funknown.png?alt=media&#x26;token=1ee76300-7a40-4c9b-bfa3-0a6c3e546115" alt=""><figcaption></figcaption></figure>

13. Verify the connection. Only **Create Users** and **Update User Attributes** should be green.

<figure><img src="https://3421475909-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXNKiIctERJykfezXfUU2%2Fuploads%2FZIgzRBG7WKYAY7MurWCu%2Funknown.png?alt=media&#x26;token=e666a68c-6dcc-4a39-821d-4e4cc592095b" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3421475909-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXNKiIctERJykfezXfUU2%2Fuploads%2FjI95EPw6PqqitlzOuSoS%2Funknown.png?alt=media&#x26;token=dfb4b7a6-84d7-4c4a-8e30-90712cfbdb9a" alt=""><figcaption></figcaption></figure>

14. &#x20;Go to provisioning and enable the fields for SCIM.

<figure><img src="https://3421475909-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXNKiIctERJykfezXfUU2%2Fuploads%2FraYdqIh3dH4V42oUQKkU%2Funknown.png?alt=media&#x26;token=35d4ce25-41cb-4458-83bb-101282a83667" alt=""><figcaption></figcaption></figure>

15. Go to SAML configuration on the same page and note the details. This needs to be feeded to Tessell.

<figure><img src="https://3421475909-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXNKiIctERJykfezXfUU2%2Fuploads%2FQ2r3kXdPOdLXcPYImCnQ%2Funknown.png?alt=media&#x26;token=d0b44238-4abc-4afc-a83f-40365538c97e" alt=""><figcaption></figcaption></figure>

16. &#x20;Go to Tessell IDP and add the details noted in the previous page of Okta.

<figure><img src="https://3421475909-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXNKiIctERJykfezXfUU2%2Fuploads%2Fd6MqvyQzKcVV0HPkByH4%2Funknown.png?alt=media&#x26;token=3fe3cb2d-d916-41b2-b5b4-7d1e1bb5b250" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3421475909-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXNKiIctERJykfezXfUU2%2Fuploads%2FlcgLFRqWHzkXjaHaLLro%2Funknown.png?alt=media&#x26;token=7ce80fa6-d9e9-48dd-a6e3-dbdeb0086e49" alt=""><figcaption></figcaption></figure>

17. At this stage, the connection setup and linking between Tessell and Okta are complete. Now create a user in AD configured with Okta, add the user to a group.

<figure><img src="https://3421475909-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXNKiIctERJykfezXfUU2%2Fuploads%2FksVKWyOuBPkB2fNd9tdW%2Funknown.png?alt=media&#x26;token=db548bd1-b6a6-45c3-b1a4-3c94d89e3fcc" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3421475909-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXNKiIctERJykfezXfUU2%2Fuploads%2FebbTzrDPjErVB8Bjwfb7%2Funknown.png?alt=media&#x26;token=c654c26a-06c1-4c9d-8041-64b09c2f19c9" alt=""><figcaption></figcaption></figure>

18. &#x20;Manually importing the users as Okta agents takes an hour to sync.

<figure><img src="https://3421475909-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXNKiIctERJykfezXfUU2%2Fuploads%2FpMS8zjaHjWVHcrTOUQx4%2Funknown.png?alt=media&#x26;token=1546a837-7d35-482d-8af1-dca89f1aca89" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3421475909-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXNKiIctERJykfezXfUU2%2Fuploads%2FwY7s5sZLItgcb5wA9GOU%2Funknown.png?alt=media&#x26;token=015867e3-440b-4775-bdbd-b474feb8dbb9" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3421475909-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXNKiIctERJykfezXfUU2%2Fuploads%2F28qVPPryHcfUnXxIrxVY%2Funknown.png?alt=media&#x26;token=b75f8dbc-0020-4226-95ac-46328838e3d4" alt=""><figcaption></figcaption></figure>

19. &#x20;Assign the newly imported user the Tessell app.

<figure><img src="https://3421475909-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXNKiIctERJykfezXfUU2%2Fuploads%2FYs3UB1EXMvWXDMfxaSbF%2Funknown.png?alt=media&#x26;token=a43f00df-d5d7-4ba3-b5da-2b481423dbe3" alt=""><figcaption></figcaption></figure>

20. Log in to Okta as the user (newly created). Tessell app shows up in the list of apps.&#x20;
    1. After the user clicks on the app, the user automatically lands on the my services page of Tessell. The user is assigned a Data Owner role and included in the default subscription.

<figure><img src="https://3421475909-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXNKiIctERJykfezXfUU2%2Fuploads%2FDYYBYm9FfB3iRLCdJNQZ%2Funknown.png?alt=media&#x26;token=63804c16-b7a3-4d93-9eba-8ebe4338a534" alt=""><figcaption></figcaption></figure>

21. &#x20;Disable the user in the AD and check if the user cannot log in/access Tessell after this.

<figure><img src="https://3421475909-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXNKiIctERJykfezXfUU2%2Fuploads%2FgUMLariB8M9mzER4CANB%2Funknown.png?alt=media&#x26;token=fd8920ca-067e-4e0f-ac3d-05f6fb10392d" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3421475909-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXNKiIctERJykfezXfUU2%2Fuploads%2FcAmYF9p5rPGkS3znwfnq%2Funknown.png?alt=media&#x26;token=90cf821d-35e5-47f6-9284-c79c81a761c7" alt=""><figcaption></figcaption></figure>

&#x20;

<br>
