Skip to main content

SCIM Provisioning

Updated over a month ago

Overview

Our SCIM integration makes it easy to automatically manage users between your identity provider (e.g. Okta) and Sign In App.

With a SCIM provisioned group, you can:

  • Automatically create, update and delete users in Sign In App based on your identity provider

  • Simplify group management by syncing user data automatically

  • Keep your employee directory up to date without manual changes

This guide walks you through setting up a new integrated group using SCIM, with Okta as an example.


Before You Start

You’ll need:

  • A Pro-tier account

  • Admin access to both your Sign In App and identity provider (e.g. Okta) accounts

Note: SCIM is available for integrated group member provisioning only. If you don’t see the SCIM option in your portal, please contact [email protected]


Part 1: Create a New SCIM Group

Step 1: Add a New Group

  1. Log in to your Sign In App account.

  2. Navigate to Manage › Groups.

  3. Click Add New.

  4. When prompted to select a group type, choose SCIM Integration.

  5. Give your new group a name — for example, Staff.


Part 2: Configure SCIM in Your Identity Provider (Okta)

Step 2: Set Up API Access in Okta

  1. Open your Okta admin portal.

  2. Navigate to your SCIM application settings.

  3. When provisioning a new application, you’ll be asked for:

    • Base URL

    • API Token

Keep this page open — you’ll copy the details from your Sign In App portal next.


Part 3: Connect Sign In Solutions to Okta

Step 3: Copy the SCIM URL

  1. Return to your Sign In App portal.

  2. Go to Manage › Groups and open your newly created SCIM group.

  3. Select the SCIM tab.

  4. Copy the SCIM URL provided:

Step 4: Paste URL into Identity provider configuration

  1. Go back to your Identity provider configuration page.

  2. Paste the copied SCIM URL into the field labeled Base URL.

Step 5: Generate and Add the API Token

  1. In Sign In App, click Generate SCIM Token.

  2. Copy your SCIM API Token.

  3. Paste it into the API Token into your identity provider.

  4. Click Test API Credentials.

✅ If your test is successful, you’ll see a confirmation message. Next, click Save to complete the connection.


Part 4: Set Up SCIM Data Sync

Step 6: Configure Data Mapping

  1. Within Okta or your identity provider, specify which data should be sent to Sign In App by selecting:

    • Create Users

    • Update User Attributes

    • Delete Users

  2. Review the mappings — the default settings work for most setups.

  3. When ready, click Save.

Step 7: Assign the Application

  1. Assign the SCIM application to the appropriate Okta group users.

  2. Once assigned, your user data will automatically sync to Sign In Solutions.

  3. That’s it! Your SCIM integration is active and your group is now linked.


Troubleshooting

If your test or sync fails, check the following:

  • The SCIM URL and API Token are copied correctly.

  • Network or firewall settings allow outbound connections to Sign In App.

  • Your identity provider’s SCIM app is assigned to the correct users or groups.


Need Help?

If you encounter any issues during setup or need assistance with another identity provider, please contact our support team: [email protected]

Did this answer your question?