User and Organization Management

Prev Next

Manage users and organization settings to secure and customize your Silent Push experience.

Invite Users

  1. Log in as an Organizational Admin.

  2. From your user icon, select Organization.

  3. In the Organization tab, add your Organization’s Name.

  4. Choose your Country from the drop-down list, and add your City.

  5. Add your Organization’s Address, Email, and Phone number.

Note: You must be an Organization Admin to create a user. They create accounts for users within their organization and invite them to join the platform, among other functions.

Before a user can use our platform, you must invite them on an organizational level. After being invited to the platform, you'll receive an email invitation from us.

Create a User

  1. From the email, select Setup Your Password and complete your registration.

  2. Select your profile icon and then select Profile Settings.

  3. To complete your profile, enter your information in the following fields:

    1. First Name

    2. Last Name

    3. Job Description

    4. Organization

    5. Contact Information

  4. Select Save.

Enable SCIM (Enterprise)

System for Cross-domain Identity Management (SCIM) is a standard protocol that enables automated user provisioning and deprovisioning for identity providers. Once enabled, your identity provider will take over user lifecycle management, from onboarding and updates to deactivation, and your staff member will be able to log in using Single Sign On.

This guide walks you through how to enable SCIM for your organisation.

Prerequisites

  • Admin access to your Identity Provider (IdP)

Contact our support team to request your SCIM Credentials

You will be provided with a SCIM Base URL and Token. Ensure you store these credentials securely.

Configure SCIM in your identity provider

  1. For Okta:

    1. Go to your Okta Admin Dashboard.

    2. Navigate to Applications > Select your app > Provisioning tab.

    3. Click Configure API Integration.

    4. Paste the SCIM Base URL and Bearer Token from your product.

    5. Test the connection and save.

  2. For Azure AD:

    1. Go to Enterprise Applications > Select your app.

    2. Under Provisioning, set the mode to Automatic.

    3. Enter the SCIM endpoint and credentials.

    4. Test and save the configuration.

Map SCIM Attributes

  1. Most identity providers allow you to configure how user data is mapped to your product. Common attributes include:

    1. userName → email

    2. name.givenName → first name

    3. name.familyName → last name

    4. emails[type eq "work"].value → work email

Test Provisioning

  1. Create a user in your IDP.

    1. See if they can sign up

  2. Update user attributes such as name.

    1. Check if the updates are reflected within the application.

  3. Deactivate User.
    1. The user should no longer be able to access their Silent Push account.