Manage users and organization settings to secure and customize your Silent Push experience.
Invite Users
Log in as an Organizational Admin.
From your user icon, select Organization.
In the Organization tab, add your Organization’s Name.
Choose your Country from the drop-down list, and add your City.
Add your Organization’s Address, Email, and Phone number.
Note: You must be an Organization Admin to create a user. They create accounts for users within their organization and invite them to join the platform, among other functions.
Before a user can use our platform, you must invite them on an organizational level. After being invited to the platform, you'll receive an email invitation from us.
Create a User
From the email, select Setup Your Password and complete your registration.
Select your profile icon and then select Profile Settings.
To complete your profile, enter your information in the following fields:
First Name
Last Name
Job Description
Organization
Contact Information
Select Save.
Enable SCIM (Enterprise)
System for Cross-domain Identity Management (SCIM) is a standard protocol that enables automated user provisioning and deprovisioning for identity providers. Once enabled, your identity provider will take over user lifecycle management, from onboarding and updates to deactivation, and your staff member will be able to log in using Single Sign On.
This guide walks you through how to enable SCIM for your organisation.
Prerequisites
Admin access to your Identity Provider (IdP)
Contact our support team to request your SCIM Credentials
You will be provided with a SCIM Base URL and Token. Ensure you store these credentials securely.
Configure SCIM in your identity provider
For Okta:
Go to your Okta Admin Dashboard.
Navigate to Applications > Select your app > Provisioning tab.
Click Configure API Integration.
Paste the SCIM Base URL and Bearer Token from your product.
Test the connection and save.
For Azure AD:
Go to Enterprise Applications > Select your app.
Under Provisioning, set the mode to Automatic.
Enter the SCIM endpoint and credentials.
Test and save the configuration.
Map SCIM Attributes
Most identity providers allow you to configure how user data is mapped to your product. Common attributes include:
userName → email
name.givenName → first name
name.familyName → last name
emails[type eq "work"].value → work email
Test Provisioning
Create a user in your IDP.
See if they can sign up
Update user attributes such as name.
Check if the updates are reflected within the application.
Deactivate User.
1. The user should no longer be able to access their Silent Push account.