SCIM (System for Cross-domain Identity Management)
Configure automated user and group provisioning for your organization with SCIM v2 support.
Overview
Simplistica’s SCIM implementation provides dual mapping capabilities for enterprise identity management, allowing you to automatically provision users and groups while maintaining granular control over roles and workspace access.
Enterprise Feature: SCIM is available for enterprise customers only. Contact sales to enable this feature.
How SCIM Works
User Lifecycle Management
1. User Provisioning
- Identity provider creates users via SCIM API
- Users are automatically added to Simplistica
- Profile and authentication accounts are created
2. Group Management
- SCIM groups are created and managed by your IdP
- Groups can represent both workspaces and role assignments
- Users are automatically added to groups
3. Role Assignment
- Role mapping rules evaluate group names
- Users get roles based on group membership
- Roles are computed in real-time with priority rules
4. Workspace Access
- Groups can be mapped to specific workspaces
- Users automatically gain access to mapped workspaces
- Access is managed through group membership
User Management
User Activation and Deactivation
Automatic User Creation
- When a user is created in your IdP, they are automatically provisioned in Simplistica
- User profiles are created with basic information (name, email)
- Authentication accounts are set up automatically
- Users are assigned to appropriate organizations based on SCIM configuration
User Status Control
- Active Users: Can sign in and access assigned workspaces
- Deactivated Users: Cannot sign in but retain their data and access history
- Status Changes: User status can be updated via SCIM API calls
Deactivation Process
- Users can be deactivated through your IdP (e.g., when they leave the company)
- Deactivated users lose access to Simplistica immediately
- Their data and documents are preserved
- Access can be restored by reactivating the user
Available Roles
Organization-Level Roles
Owner
- Full administrative control over the organization
- Can manage organization settings, billing, and members
- Can configure SCIM and SSO settings
- Only one owner per organization
- Cannot be assigned through SCIM (must be set manually)
Admin
- Full administrative access within the organization
- Can manage organization members and their roles
- Can create and manage workspaces
- Can configure organization settings (except billing)
- Can be assigned through SCIM role mapping
Editor
- Content creation and editing capabilities
- Can create, edit, and delete documents
- Can manage documents they own
- Cannot manage organization settings or other users
- Can be assigned through SCIM role mapping
Viewer
- Read-only access to assigned workspaces
- Can view documents and content
- Cannot create, edit, or delete content
- Cannot access organization settings
- Can be assigned through SCIM role mapping
Role Assignment Through SCIM
Automatic Role Mapping
- Roles are assigned based on SCIM group membership
- Group names are evaluated against role mapping rules
- First matching rule determines the user’s role
- Rules are evaluated in priority order (higher priority first)
Role Mapping Examples
admin|.*-admin→ Admin rolemanager|.*-manager→ Admin roleeditor|.*-editor→ Editor roleviewer|.*-viewer→ Viewer roleformer|.*-former→ Deactivated status
Priority System
- Higher priority rules take precedence
- Rules are evaluated from highest to lowest priority
- Users can only have one role at a time
- Role changes are applied immediately
Configuration
SCIM Setup
1. Create Connection
- Go to Settings → SCIM in Simplistica
- Click “Create SCIM Connection”
- A bearer token will be generated automatically
2. Configure Your IdP
- Use the provided bearer token for authentication
- Configure the base URL and endpoints
- Set up user and group provisioning
3. Enable/Disable
- Toggle the connection on/off as needed
- Generate new tokens for security
- Monitor connection status
Endpoints
Required Endpoints
Base URL:
https://simplistica.co/api/scim/v2Users Endpoint:
/UsersGroups Endpoint:
/GroupsAuthentication:
Authorization: Bearer <your-scim-token>Role Mapping
Role Assignment
Available Roles:
- Admin: Full administrative access
- Editor: Content editing access
- Viewer: Read-only access
- Deactivated: Account deactivation
Pattern Matching:
- Use regex patterns to match group names
- Examples:
admin|.*-admin,manager,editor - Case-insensitive matching
- Priority-based rule evaluation
Security
Security Best Practices
Token Management:
- Keep bearer tokens secure
- Rotate tokens regularly
- Use HTTPS for all communications
Access Control:
- Only workspace owners can configure SCIM
- Monitor SCIM activity logs
- Review role mappings periodically
Pro Tip: For optimal SCIM setup, combine it with SSO. SSO handles authentication while SCIM handles user provisioning, role assignment, and workspace access management.
Support: If you encounter issues with SCIM setup, contact our support team with your IdP configuration details and error messages.