With Tray, you build
IconAutomations
IconIntegrations
and
IconAgents
that connect Okta across your business systems and teams.
Icon

Use cases

Okta + Tray

Okta is where identity and access are managed for users, groups, roles, and application provisioning. But access decisions often depend on changes happening in other systems.

Tray extends Okta across your stack, connecting it to HR, ITSM, CRM, finance, and any other system you rely on. User lifecycle events, group changes, and authentication updates can trigger orchestrated workflows, governed automations, and agents that take action across tools, while keeping Okta as the source of truth for identity.

See how different teams use Tray to take action from Okta.

What you can do with Tray

  • IT

    IT

    If you work in IT, these are common ways teams use Tray with Okta to automate provisioning and maintain access governance.

    • Provision access from lifecycle events: Create or update accounts in downstream apps when users are added or role changes occur
    • Deprovision access on termination: Remove access across systems immediately when users are deactivated
    • Sync group membership across tools: Align Okta groups with permissions in CRM, collaboration, and finance systems
  • Security

    Security

    If you work in security or compliance, these are common ways teams use Tray with Okta to reduce risk and maintain audit readiness.

    • Enforce least-privilege access on role changes: Adjust downstream permissions automatically when user roles change
    • Log access changes for audit: Maintain a centralized audit trail of provisioning and deprovisioning actions
    • Alert on high-risk access events: Notify security teams when privileged roles or sensitive groups are modified
  • HR

    HR

    If you work in HR or people operations, these are common ways teams use Tray with Okta to coordinate onboarding and offboarding across systems.

    • Trigger onboarding workflows: Create accounts, assign groups, and notify stakeholders when new hires are added
    • Automate offboarding processes: Deactivate accounts and remove access when terminations are recorded
    • Sync employee updates across systems: Keep title, department, and manager changes aligned across identity and operational tools
  • Business systems

    Business systems

    If you build and scale systems for the business, these are common ways teams use Tray with Okta to standardize identity-driven workflows.

    • Connect Okta to the stack: Sync users, groups, and role changes with HR, ITSM, CRM, and finance systems
    • Standardize provisioning logic: Reuse access rules and approval workflows across departments
    • Expose identity workflows as agent tools: Allow governed agents to initiate approved access actions safely
  • Product and engineering

    Product and engineering

    If you work in product and engineering, these are common ways teams use Tray with Okta to streamline application access and environment management.

    • Provision app access automatically: Grant access to development tools based on team or project assignment
    • Sync role changes to infrastructure tools: Update permissions in CI/CD or cloud platforms when group membership changes
    • Notify teams of access updates: Post updates to collaboration channels when access is granted or revoked
  • Finance

    Finance

    If you work in finance, these are common ways teams use Tray with Okta to manage application access and license costs.

    • Track application license usage: Sync access data to financial systems for cost visibility
    • Automate approval for paid app access: Route structured approvals before provisioning licensed tools
    • Reclaim licenses on termination: Remove access and free licenses when users leave
Slack Logo
Tray Logo
Icon

Automations

Automations with Okta and Tray

Tray automates how Okta connects with your other systems. HR or directory events can start workflows that create, modify, or deactivate users across SaaS, on-prem, and internal tools. Workflows can use Okta event hooks or scheduled checks to detect changes, apply logic for access policies, and manage approvals before updates occur.

Each workflow includes retries, error handling, and sequencing controls so changes happen in the right order and under governance. A single workflow can create users in Okta, add them to Jira projects, and post onboarding notifications in Slack, all in one governed process.

Workflows are designed visually in Tray’s drag-and-drop builder, making complex identity automation faster to build and easier to govern. Tray processes high-volume provisioning events with built-in queuing, retries, and dependency management to keep data consistent across systems.

Icon

Integrations

Integrations with Okta and Tray

Tray connects Okta with HR, IT, and security tools to unify identity management. Integrations keep user records and access policies consistent across systems. Tray supports hybrid identity environments where Okta can act as the source or target alongside tools such as Azure Active Directory (AD), Ping, or custom directories.

Tray’s HTTP connector supports custom authentication, pagination, and rate-limit handling to integrate any system with an API, including complex internal or legacy applications.

Workflows can extend with HTTP steps to include specialized or proprietary systems while maintaining full control.

Okta integration capabilities

Integrate Okta with 700+ applications using the Okta connector or any system with an API using Tray’s HTTP connector. These domains mirror Okta APIs and how IT teams actually manage identities, groups, and access policies across systems.

Manage lifecycle and access across systems

  • Create and update users: Add, update, or deactivate users based on HR or system changes
  • Sync group membership: Align roles, departments, and permissions across applications
  • Mirror changes: Update connected systems when Okta attributes change
  • Remove users: Trigger offboarding workflows and revoke access consistently
  • Attach attributes: Sync metadata such as manager, cost center, or location
  • Integrate with SCIM (System for Cross-domain Identity Management): Manage identities and attributes using standard protocols
Icon

Agents

Build agents with Okta and Tray

Agents built in Tray Merlin Agent Builder can check, update, and enforce access across systems using Okta data for context. Okta acts as the trusted source of truth for identity and access data, so every agent action stays aligned with verified records. These agents combine identity details from Okta with data from HR, ITSM, or finance tools to take action under defined permissions.

Ground agents with relevant Okta knowledge

  • Combine sources: Use Okta with HR or ITSM data for context-aware actions
  • Build a data source: Query approved user, group, and app assignment data through APIs
  • Filter scope: Limit access by department, role, or app
  • Detect changes: Use event triggers or scheduled checks to stay current
  • Use company knowledge: Return approved data grounded in internal context and link back to the correct records

Frequently Asked Questions

Find answers to common questions about our products and services.

How does Tray connect to Okta?

Tray connects through Okta APIs using scoped credentials and event hooks in secure environments.

Does Tray use the Okta API?

Yes. Tray integrates through the official Okta API to manage users, groups, apps, and events securely.

Can Tray automate provisioning and deprovisioning?

Yes. Workflows can create, modify, or remove users and app assignments automatically across systems.

Can Tray handle approvals before access changes?

Yes. You can include approval steps for security or manager review before workflows continue.

Which Okta objects are supported?

Users, groups, apps, roles, events, and assignments. Workflows can read, update, or sync these objects while handling pagination and rate limits.

How does Tray manage reliability and scale?

Tray validates field types, retries failed steps automatically, and processes updates in order to prevent data conflicts. It handles high-volume event throughput with built-in queuing and dependency management.

Where is data stored?

Data moves securely through Tray’s governed platform during workflow execution and is never stored beyond what’s required for processing or logging.

What’s a simple starting use case?

Start with an automation that creates Okta users when new hires are added in BambooHR. Then expand to offboarding, approvals, and chat-based access checks.

FAQs

Yes. Tray integrates through the official Okta API to manage users, groups, apps, and events securely.

What comes standard with Tray

Whether your systems, data, or models run in the cloud or on-premises, Tray connects them in one secure platform. Every connection, workflow, and agent operates under IT governance with encryption, audit logging, and access controls built in. Security teams can trust that all integrations comply with enterprise network and authentication policies.

Universal connectivity

  • Prebuilt connectors: 700+ connectors plus a universal HTTP connector for any REST API
  • Custom connectors: Build custom connectors that behave like native ones
  • Connect anywhere: Cloud or on-prem systems supported

Learn more about our connectivity options

On-premises connectivity

  • Connect securely: Access on-premises systems, whether first-party or third-party
  • Meet network requirements: Connect through approved configurations that align with enterprise security policies
  • Enterprise protocols: Support multiple on-premises security standards for safe integration

Learn more about on-premises connectivity

Authentication management

  • Secure credentials: Collect and store authentications with full encryption
  • Encrypted data: Protect all data at rest and in transit
  • Role-based control: Partition credentials by workspace and access level

Learn more about authentication management

Security and governance

  • Certified compliance: SOC 2 Type II, GDPR, CCPA, HIPAA
  • End-to-end protection: Encryption, detailed audit logs, scoped connections, and OAuth scopes

Learn more about security and governance