Skip to Content
AdministrationSecuritySCIM Provisioning

SCIM Provisioning

Automate user provisioning with SCIM 2.0.

SCIM provisioning requires a Business plan or higher.

What is SCIM?

SCIM (System for Cross-domain Identity Management) enables:

  • Automatic user creation
  • User attribute synchronization
  • User deprovisioning
  • Group management

Supported Identity Providers

SCIM works with:

  • Okta
  • Azure AD (Microsoft Entra ID)
  • OneLogin
  • JumpCloud
  • Ping Identity
  • And other SCIM 2.0 providers

Configuration

Step 1: Enable SCIM

  1. Go to OrganizationSecuritySCIM
  2. Click Enable SCIM

Step 2: Generate API Token

  1. Click Generate Token
  2. Copy the token immediately (shown only once)
  3. Store securely

Step 3: Note SCIM Endpoint

Your SCIM endpoint:

https://penvio.io/api/scim/v2/{org-id}

Step 4: Configure Your IdP

In your identity provider:

  1. Add Penvio as a SCIM application
  2. Enter the SCIM endpoint URL
  3. Enter the API token as Bearer token
  4. Configure attribute mapping
  5. Enable provisioning

Supported Operations

Users

OperationDescription
CreateNew user from IdP
UpdateSync user attributes
DeactivateSuspend user
DeleteRemove user

Groups

OperationDescription
CreateCreate team from IdP group
UpdateUpdate team membership
DeleteRemove team

Attribute Mapping

User Attributes

SCIM AttributePenvio Field
userNameemail
name.givenNamefirstName
name.familyNamelastName
displayNamedisplayName
activeisActive

Group Attributes

SCIM AttributePenvio Field
displayNameteamName
membersteamMembers

Provisioning Behavior

New Users

When IdP creates a user:

  1. User is created in Penvio
  2. Default role is assigned
  3. Welcome email sent (optional)
  4. User can sign in via SSO

Updated Users

When IdP updates a user:

  1. Attributes are synchronized
  2. Changes apply immediately
  3. Logged in audit trail

Deprovisioned Users

When IdP removes a user:

  1. User is deactivated in Penvio
  2. Access is immediately revoked
  3. Data is retained per policy

Token Management

Regenerate Token

If token is compromised:

  1. Go to SCIM settings
  2. Click Regenerate Token
  3. Update token in IdP
  4. Old token is invalidated

Regenerating a token immediately invalidates the previous token. Update your IdP configuration promptly to avoid provisioning failures.

Token Security

  • Tokens never expire (until regenerated)
  • Store securely in IdP
  • Audit token usage in logs

Troubleshooting

Provisioning Failed

  • Verify SCIM endpoint URL
  • Check token is valid
  • Confirm attribute mapping
  • Review IdP logs

Users Not Created

  • Ensure email is unique
  • Check required attributes
  • Verify user is assigned to app in IdP

Groups Not Syncing

  • Confirm group is assigned to app
  • Check group attribute mapping
  • Verify team creation permissions

Next Steps

Last updated on