Manage your SSO Users

Prev Next

System for Cross-domain Identity Management (SCIM) is a standard protocol that enables automated user provisioning and deprovisioning for identity providers. Once enabled, your identity provider will take over user lifecycle management, from onboarding and updates to deactivation, and your staff member will be able to log in using Single Sign On.

This guide walks you through how to enable SCIM for your organisation.

Prerequisites

  • Admin access to your Identity Provider (IdP)

Step 1: Contact our support team to request your SCIM Credentials

You will be provided with a SCIM Base URL and Token. Ensure you store these credentials securely.

Step 2: Configure SCIM in your identity provider

  1. For Okta:

    1. Go to your Okta Admin Dashboard.

    2. Navigate to Applications > Select your app > Provisioning tab.

    3. Click Configure API Integration.

    4. Paste the SCIM Base URL and Bearer Token from your product.

    5. Test the connection and save.

  2. For Azure AD:

    1. Go to Enterprise Applications > Select your app.

    2. Under Provisioning, set the mode to Automatic.

    3. Enter the SCIM endpoint and credentials.

    4. Test and save the configuration.

Step 3: Map SCIM Attributes

  1. Most identity providers allow you to configure how user data is mapped to your product. Common attributes include:

    1. userName → email

    2. name.givenName → first name

    3. name.familyName → last name

    4. emails[type eq "work"].value → work email

Step 4: Test Provisioning

  1. Create a user in your IDP.

    1. See if they can sign up

  2. Update user attributes such as name.

    1. Check if the updates are reflected within the application.

  3. Deactivate User.
    1. The user should no longer be able to access their Silent Push account.