SCIM provisioning

Prev Next

Plans supporting this feature: Enterprise

What is SCIM?

SCIM (System for Cross-domain Identity Management) is an open standard protocol that automates how user identities are created, updated, and removed across different applications.

How SCIM simplifies user management

In most organizations, managing user access across multiple platforms is a time-consuming and error-prone process. Administrators have to manually add new employees, and remember to remove access when someone leaves. SCIM eliminates all of this.

With SCIM enabled in Document360, your IdP handles this automatically. Any change you make in your IdP syncs to Document360 right away.

  • When a new employee joins, simply add them to your IdP and their account is automatically created across all connected applications, including Document360.

  • When someone leaves the organization, their access across all connected applications, including Document360, is revoked automatically.

This keeps your team access accurate, secure, and always up to date, without any extra effort from your administrators.

Flowchart illustrating user provisioning, enforcement, and updates in a system process.

Depending on your IdP, SCIM provisioning in Document360 lets you manage the following directly from your IdP:

  • Users – Automatically provision and manage users in Document360.

  • Readers – Provision reader accounts and control their content access.

  • Groups – Create and sync user and reader groups for streamlined permission management.

Profile attribute mapping

For SCIM provisioning to work correctly, your Identity Provider must pass the right user attributes, such as name and email, to Document360. This is configured through profile attribute statements and ensures users are provisioned with accurate information.

For step-by-step instructions on configuring profile attribute statements in Okta, see Assign Profile attribute statements.

Configure SCIM with your Identity Provider

SCIM provisioning in Document360 is set up as part of your SSO configuration. Select your identity provider below to get started:

SAML

OpenID Connect (OIDC)