Learn how to deploy 1Password SCIM Bridge on the DigitalOcean App Platform service.
This deployment consists of two resources: a service for the for the SCIM bridge and an internal service for Redis. There are a few benefits to deploying 1Password SCIM Bridge on DigitalOcean App Platform:
- Low cost: For standard deployments, the service will host your SCIM bridge for ~$10 USD/month (as of March 2024). App Platform pricing is variable based on activity. Learn more on DigitalOcean's pricing page.
- Automatic DNS record management: You don't need to manage a DNS record. App Platform automatically provides a unique one for your SCIM bridge domain.
- Automatic TLS certificate management: App Platform automatically handles TLS certificate management on your behalf.
- Multiple deployment options: You can deploy the SCIM bridge directly to DigitalOcean from your local terminal using this guide, or from the DigitalOcean Apps portal using the support guide. If you're using a custom deployment, cloning this repository is recommended.
Before you begin, complete the necessary preparation steps to deploy 1Password SCIM Bridge. You'll also need:
- A DigitalOcean account with available quota for two droplets.
- 1Password 8 for Mac or Windows or Linux.
- 1Password CLI 2.9.0 or later.
doctl
Note
If you're using macOS or Linux, you only need to follow Step 1: Install doctl in the doctl
installation guide.
After you install 1Password CLI, add your 1Password account, then follow these steps:
- Add your 1Password account to 1Password 8 for Mac, Windows or Linux.
- Connect 1Password CLI to the 1Password app.
- Create a DigitalOcean personal access token and select scopes for read and write.
- Grant access to
doctl
:- If you're using macOS or Linux, configure the DigitalOcean shell plugin for 1Password CLI. Choose
Import into 1Password…
to save your DigitalOcean personal access token in your 1Password account and authenticatedoctl
. - If you're using Windows, follow the steps to use the API token to grant account access to doctl.
- If you're using macOS or Linux, configure the DigitalOcean shell plugin for 1Password CLI. Choose
- Run the following command to confirm that
doctl
can authenticate:doctl account get
- Sign in to your account on 1Password.com.
- Create a vault to store your 1Password SCIM Bridge credentials in. This guide is written with the vault name
op-scim
, but you can change it to something else if you prefer. - Choose Integrations in the sidebar.
- Choose your identity provider from the User Provisioning section.
- Select Custom, then choose Next.
- Choose Save in 1Password for both the
scimsession
file and bearer token to save them as items in your 1Password account. Save each item in the vault you just created.
In this step, you'll save the scimsession
credentials as an environment variable in App Platform, which DigitalOcean will encrypt on your behalf. These credentials have to be Base64-encoded to pass them into the environment, but they're saved as a file in your 1Password item.
Copy and paste the following command for your shell to read the file using its secret reference, encode the credentials, and store them as a new field in the "scimession file" item saved in your 1Password account. If you gave the vault a custom name, replace op-scim
with the name of your vault, then run the command.
Bash:
op item edit "scimsession file" --vault "op-scim" base64_encoded=$(op read "op://op-scim/scimsession file/scimsession" | base64 | tr -d "\n")
Powershell:
op item edit "scimsession file" --vault "op-scim" base64_encoded=$([Convert]::ToBase64String([System.Text.Encoding]::UTF8.GetBytes($(op read "op://op-scim/scimsession file/scimsession"))))
Run the following command for your shell to stream the app spec template from this repository, use op inject
to load in the Base64-encoded scimesssion
credentials from your 1Password account, and pipe the output into doctl
.
Bash:
curl -s https://raw.githubusercontent.com/1Password/scim-examples/main/do-app-platform-op-cli/op-scim-bridge.yaml | op inject | doctl apps create --spec - --wait
Powershell:
Invoke-RestMethod -Uri https://raw.githubusercontent.com/1Password/scim-examples/main/do-app-platform-op-cli/op-scim-bridge.yaml | op inject | doctl apps create --spec - --wait
After you deploy your SCIM bridge, you'll see a URL in the Default Ingress
column of the terminal output. This is your SCIM bridge URL. Run the following command for your shell to test the connection to 1Password.
Copy the following command, replace https://op-scim-bridge-example.ondigitalocean.app
with your SCIM bridge URL, then run the command in your terminal to test the connection and view status information.
Bash:
curl --silent --show-error --request GET --header "Accept: application/json" --header "Authorization: Bearer $(
op read op://${VAULT:-op-scim}/${ITEM:-"bearer token"}/credential)"
) https://op-scim-bridge-example.ondigitalocean.app/health
PowerShell:
Invoke-RestMethod -Method GET -Auth OAuth -Token $(
op read "op://op-scim/bearer token/credential" | ConvertTo-SecureString -AsPlainText
) -Uri https://op-scim-bridge-example.ondigitalocean.app/health | ConvertTo-Json
Example JSON response:
{
"build": "209031",
"version": "2.9.3",
"reports": [
{
"source": "ConfirmationWatcher",
"time": "2024-04-25T14:06:09Z",
"expires": "2024-04-25T14:16:09Z",
"state": "healthy"
},
{
"source": "RedisCache",
"time": "2024-04-25T14:06:09Z",
"expires": "2024-04-25T14:16:09Z",
"state": "healthy"
},
{
"source": "SCIMServer",
"time": "2024-04-25T14:06:56Z",
"expires": "2024-04-25T14:16:56Z",
"state": "healthy"
},
{
"source": "StartProvisionWatcher",
"time": "2024-04-25T14:06:09Z",
"expires": "2024-04-25T14:16:09Z",
"state": "healthy"
}
],
"retrievedAt": "2024-04-25T14:06:56Z"
}
To view this information in a visual format, visit your SCIM bridge URL in a web browser. Sign in with your bearer token, then you can view status information and download container log files.
To finish setting up automated user provisioning, connect your identity provider to the SCIM bridge.
Follow the steps in this section to connect your SCIM bridge to Google Workspace.
Connect Google Workspace to your SCIM bridge
Follow the steps to create a Google service account, key, and API client, then save the file to the 1Password vault you created in step 2.1. Name the item workspace-credentials
.
Copy and paste the following command for your shell to read the file using its secret reference, encode the credentials, and store them as a new field in the workspace-credentials
item you just saved in your 1Password account. If you gave the vault a custom name, replace op-scim
with the name of your vault, then run the command.
Bash:
op item edit "workspace-credentials" --vault "op-scim" base64_encoded_credentials=$(op read "op://op-scim/workspace-credentials/workspace-credentials.json" | base64 | tr -d "\n")
Powershell:
op item edit "workspace-credentials" --vault "op-scim" base64_encoded_credentials=$([Convert]::ToBase64String([System.Text.Encoding]::UTF8.GetBytes($(op read "op://op-scim/workspace-credentials/workspace-credentials.json"))))
- Download the
workspace-settings.json
file from this repo. - Edit the following in this file:
- Actor: Enter the email address of the Google Workspace administrator for the service account.
- Bridge Address: Enter your SCIM bridge domain. Used in step 4 to test your SCIM bridge. This isn't your 1Password account sign-in address. For example:
https://op-scim-bridge-example.ondigitalocean.app
.
- Save the file.
Next, you'll need to create a Base64 value for the workspace-settings
file. Copy and paste the following command for your shell. If you gave the vault a custom name, replace op-scim
with the name of your vault, then run the command.
Bash:
op item edit "workspace-credentials" --vault "op-scim" base64_encoded_settings=$(cat "pathToFile/workspace-settings.json" | base64 | tr -d "\n")
Powershell:
op item edit "workspace-credentials" --vault "op-scim" base64_encoded_settings=$([Convert]::ToBase64String([System.Text.Encoding]::UTF8.GetBytes($(cat "pathToFile/workspace-settings.json"))))
To finish connecting Google Workspace to your SCIM bridge, run the following command to get the op-scim-bridge-gw.yaml file and inject the Base64 values for your Workspace configuration.
Bash:
curl -s https://raw.githubusercontent.com/1Password/scim-examples/main/do-app-platform-op-cli/google-workspace/op-scim-bridge-gw.yaml | op inject | doctl apps create --spec - --wait --upsert
Powershell:
Invoke-RestMethod -Uri https://raw.githubusercontent.com/1Password/scim-examples/main/do-app-platform-op-cli/google-workspace/op-scim-bridge-gw.yaml | op inject | doctl apps create --spec - --wait --upsert
To update your SCIM bridge, run the following command for your shell.
Bash:
curl -s https://raw.githubusercontent.com/1Password/scim-examples/main/do-app-platform-op-cli/op-scim-bridge.yaml | op inject | doctl apps create --spec - --wait --upsert
Powershell:
Invoke-RestMethod -Uri https://raw.githubusercontent.com/1Password/scim-examples/main/do-app-platform-op-cli/op-scim-bridge.yaml | op inject | doctl apps create --spec - --wait --upsert
The op-scim-bridge.yaml file that this command uses should have the latest version in it. If the version doesn't match the one on the SCIM bridge releases notes website, you can download the file and update it before you run the command.
The pod for 1Password SCIM Bridge should be vertically scaled if you provision a large number of users or groups. These are our default resource specifications and recommended configurations for provisioning at scale:
Volume | Number of users | CPU | Memory |
---|---|---|---|
Default | <1,000 | 0.25 | 0.5Gi |
High | >1,000 | 1.0 | 1.0Gi |
If you're provisioning more than 1,000 users, update the resources assigned to the SCIM bridge container to follow these recommendations. The resources specified for the Redis container don't need to be adjusted.
If you're provisioning up to 1,000 users, run the following command:
Bash:
curl -s https://raw.githubusercontent.com/1Password/scim-examples/main/do-app-platform-op-cli/op-scim-bridge.yaml | op inject | doctl apps create --spec - --wait --upsert
Powershell:
Invoke-RestMethod -Uri https://raw.githubusercontent.com/1Password/scim-examples/main/do-app-platform-op-cli/op-scim-bridge.yaml | op inject | doctl apps create --spec - --wait --upsert
If you're provisioning more than 1,000 users:
-
Download the
op-scim-bridge.yaml
file and open it in a text editor. -
Change the
instance_size_slug
value for theop-scim-bridge
service tobasic-xs
:services: # ... - ### ... instance_size_slug: basic-xs name: op-scim-bridge
-
Run the following command (replace
./op-scim-bridge.yaml
with the path to your modified app spec file as needed):cat ./op-scim-bridge.yaml | op inject | doctl apps create --spec - --wait --upsert
If you choose a custom name for vault or items where you saved your SCIM bridge credentials, you can override the defaults using the VAULT
and ITEM
variables in the secret references. For example:
Bash:
curl -s https://raw.githubusercontent.com/1Password/scim-examples/main/do-app-platform-op-cli/op-scim-bridge.yaml | VAULT="vault name" ITEM="item name" op inject | doctl apps create --spec - --wait
Powershell:
Invoke-RestMethod -Uri https://raw.githubusercontent.com/1Password/scim-examples/main/do-app-platform-op-cli/op-scim-bridge.yaml | VAULT="vault name" ITEM="item name" op inject | doctl apps create --spec - --wait
To verify the cost of your SCIM bridge deployment with DigitalOcean before you deploy, run the following command for your shell.
Bash:
curl -s https://raw.githubusercontent.com/1Password/scim-examples/main/do-app-platform-op-cli/op-scim-bridge.yaml | doctl apps propose --spec -
Powershell:
Invoke-RestMethod -Uri https://raw.githubusercontent.com/1Password/scim-examples/main/do-app-platform-op-cli/op-scim-bridge.yaml | doctl apps propose --spec -