FreshService + Okta

Automate IT Service Management with FreshService + Okta Integration

Connect your identity provider with your service desk to stop manual provisioning, speed up onboarding, and keep access management in sync.

Why integrate FreshService and Okta?

FreshService and Okta handle two of the most operationally tangled problems in IT — one manages service requests and incidents, the other controls who has access to what across your application stack. When these systems run separately, IT teams burn hours manually translating ticket requests into access changes, and provisioning tasks fall through the cracks. Integrating FreshService with Okta on tray.ai closes that gap, automating the full lifecycle of user access from the moment a ticket is raised to the moment permissions are confirmed.

Automate & integrate FreshService & Okta

Use case

Automated User Onboarding and Provisioning

When a new employee onboarding ticket is created or approved in FreshService, tray.ai triggers user creation in Okta, assigns the appropriate groups and application entitlements based on department or role, and updates the FreshService ticket with a confirmation once provisioning is complete. The handoff delay between HR workflows and IT execution disappears, so new hires have access on day one.

Use case

Instant User Deprovisioning on Offboarding Tickets

When an offboarding ticket is submitted or reaches a specific approval stage in FreshService, tray.ai suspends or deactivates the corresponding user account in Okta, revokes active sessions, and removes group memberships. The FreshService ticket is then updated with a full deprovisioning audit trail, helping IT and security teams meet compliance requirements.

Use case

Role Change and Access Modification Requests

When an employee changes roles and a corresponding service request is approved in FreshService, tray.ai detects the approval and updates Okta group memberships and application assignments to reflect the new role. Old access is revoked and new access is granted in a single automated workflow, with the ticket updated to reflect every change made.

Use case

Access Request Fulfillment and Approval Workflows

Employees can submit application or resource access requests through FreshService's service catalog. tray.ai monitors these tickets and, upon manager approval, provisions the requested Okta application assignment or group membership and resolves the ticket. Denials trigger Okta to confirm no unauthorized access is granted — all without IT manually stepping in.

Use case

Okta Suspicious Activity Alerts to FreshService Incidents

When Okta detects suspicious login behavior, policy violations, or MFA failures for a user, tray.ai creates a high-priority incident in FreshService with full context from Okta — user details, event type, IP address, and timestamp. Security events are immediately visible to IT support teams and routed through your standard incident management process.

Use case

Periodic Access Review and Recertification

On a scheduled cadence, tray.ai queries Okta for user group memberships and application assignments, cross-references them against active employee records in FreshService, and generates access review tasks or tickets for IT and managers to certify or revoke stale access. Your Okta environment stays clean and audit-ready without manual spreadsheet exports.

Use case

Password Reset and MFA Self-Service Ticket Automation

When a user submits a password reset or MFA enrollment request through FreshService, tray.ai triggers the appropriate action in Okta — resetting credentials, sending an activation email, or re-enrolling a factor — and resolves the FreshService ticket once complete. L1 help desk ticket volume drops, and identity-related requests stop piling up.

Get started with FreshService & Okta integration today

FreshService & Okta Challenges

What challenges are there when working with FreshService & Okta and how will using Tray.ai help?

Challenge

Keeping User Data in Sync Across Both Systems

FreshService often holds detailed employee data — department, location, job title — while Okta needs accurate profile attributes for policy enforcement and app assignment. Manually keeping these in sync when employees change roles or details leads to mismatches and access inconsistencies.

How Tray.ai Can Help:

tray.ai lets you build bi-directional sync workflows that map FreshService requester fields directly to Okta user profile attributes. When something changes in either system, the other updates automatically — no manual reconciliation, no stale data.

Challenge

Managing Complex Approval Chains Before Provisioning

Many organizations require multi-level approvals in FreshService before access changes are made in Okta. Building and maintaining these conditional approval flows manually — and confirming Okta actions fire only after all approvals are complete — is error-prone and hard to audit.

How Tray.ai Can Help:

tray.ai's workflow engine supports conditional branching and multi-step logic, so you can model your exact approval hierarchy from FreshService and trigger Okta provisioning only when all required approvals are in. Every decision point gets logged, so you've got a clean audit trail.

Challenge

Handling Okta API Rate Limits During Bulk Operations

During large-scale onboarding events or periodic access reviews, workflows may attempt to provision or query hundreds of Okta users in rapid succession, hitting Okta's API rate limits and causing provisioning failures or incomplete access reviews.

How Tray.ai Can Help:

tray.ai includes built-in rate limit handling, retry logic, and throttling controls that automatically pace API calls to stay within Okta's limits. Bulk provisioning workflows finish reliably without failed operations or partial results.

Challenge

Ensuring Deprovisioning Completeness and Auditability

When offboarding, IT teams must confirm every Okta group membership and application assignment is removed — deactivating the user account alone isn't enough. Missing even one application assignment leaves a security gap, and without a complete audit log, proving compliance is difficult.

How Tray.ai Can Help:

tray.ai workflows enumerate and remove all Okta group memberships and app assignments for a departing user in sequence, then write a full deprovisioning summary back to the FreshService ticket. You get one auditable record of every access change made during offboarding.

Challenge

Routing Security Alerts to the Right Teams Without Noise

Not every Okta event warrants a FreshService incident. Flood the service desk with low-severity alerts and you'll bury the critical ones — teams either miss what matters or burn out on noise they've learned to ignore.

How Tray.ai Can Help:

tray.ai lets you apply custom filtering logic to Okta event streams, so only high-severity or policy-violating events become FreshService incidents. Lower-priority events can be logged, aggregated, or sent to a monitoring tool instead — the right alert reaches the right team at the right priority.

Start using our pre-built FreshService & Okta templates today

Start from scratch or use one of our pre-built FreshService & Okta templates to quickly solve your most common use cases.

FreshService & Okta Templates

Find pre-built FreshService & Okta solutions for common use cases

Browse all templates

Template

New FreshService Onboarding Ticket → Create and Provision Okta User

Watches for approved onboarding tickets in FreshService and creates a new user in Okta with the correct profile attributes, group memberships, and application assignments based on department and role fields in the ticket.

Steps:

  • Trigger when a FreshService onboarding ticket is created or moves to 'Approved' status
  • Extract user details and role/department from the FreshService ticket fields
  • Create the user in Okta with the mapped profile attributes
  • Assign the user to the appropriate Okta groups and application entitlements based on role
  • Update the FreshService ticket with provisioning confirmation and Okta user ID

Connectors Used: FreshService, Okta

Template

FreshService Offboarding Ticket → Deactivate Okta User

Monitors FreshService for offboarding or termination tickets and suspends the user in Okta, terminates active sessions, removes group memberships, and logs all deprovisioning steps back to the originating FreshService ticket.

Steps:

  • Trigger when a FreshService offboarding ticket is approved or reaches a defined stage
  • Look up the corresponding Okta user by email address from the ticket
  • Suspend the Okta user account and clear all active sessions
  • Remove the user from all Okta groups and application assignments
  • Update and resolve the FreshService ticket with a full deprovisioning summary

Connectors Used: FreshService, Okta

Template

Okta Security Alert → FreshService Incident Creation

Listens for Okta system log events flagged as suspicious — such as brute force attempts, impossible travel logins, or MFA fatigue attacks — and creates a prioritized incident in FreshService with full event context for immediate IT investigation.

Steps:

  • Trigger on Okta system log events matching defined security threat patterns
  • Parse event details including user, IP address, event type, and risk level from Okta
  • Create a high-priority incident in FreshService with all relevant Okta event context
  • Assign the incident to the appropriate security or IT team in FreshService
  • Post a notification to the relevant Slack or Teams channel as an optional step

Connectors Used: FreshService, Okta

Template

FreshService Access Request Approval → Okta Group Assignment

Automates the fulfillment of application access requests submitted through FreshService's service catalog by watching for ticket approvals and assigning the requested Okta application or group, then resolving the ticket once provisioning is confirmed.

Steps:

  • Trigger when a FreshService access request ticket moves to 'Approved'
  • Identify the requested application or resource from the ticket's custom fields
  • Look up the requestor's Okta user profile by their email
  • Assign the user to the requested Okta application or group
  • Resolve the FreshService ticket and notify the requestor of successful access grant

Connectors Used: FreshService, Okta

Template

Scheduled Okta Access Review → FreshService Review Tasks

On a recurring schedule, pulls all Okta user group and application assignments and creates access review tasks in FreshService for IT managers to certify or flag for revocation, so access governance runs continuously without manual data collection.

Steps:

  • Trigger on a defined schedule (e.g., quarterly) using tray.ai's scheduler
  • Query Okta for all active users and their current group and application assignments
  • Cross-reference with active employee list from FreshService or an HRIS
  • Create access review task tickets in FreshService for each user or group to be certified
  • Route tasks to the appropriate manager or application owner for approval or revocation

Connectors Used: FreshService, Okta

Template

FreshService Password Reset Ticket → Okta Credential Reset

Detects password reset or MFA re-enrollment tickets in FreshService and triggers the corresponding action in Okta — sending the user an activation email or resetting their credentials — then auto-resolves the ticket once the action is confirmed.

Steps:

  • Trigger when a FreshService ticket matching 'password reset' or 'MFA' keywords is created
  • Validate the requesting user's identity against their Okta profile
  • Trigger the appropriate Okta action — password reset email or MFA re-enrollment link
  • Confirm successful action from Okta's API response
  • Auto-resolve the FreshService ticket and notify the user via email

Connectors Used: FreshService, Okta