Skip to main content

SCIM User Management Setup

Set up SCIM provisioning to automatically sync users from your identity provider.

Prerequisites:

  • SSO must be configured and working in Pirros (see the Set Up SSO article)

  • JIT Provisioning must be enabled in Pirros

  • Application Administrator permissions in your identity provider (Azure AD or Okta)

SCIM (System for Cross-domain Identity Management) automates user account creation and removal in Pirros. When you add or remove a user from your identity provider, SCIM automatically updates Pirros — no manual user management needed.


Microsoft Azure AD / Entra ID

If you have already followed the full SSO and SCIM setup guide (article 5.1), SCIM is already configured. The steps below are for firms that set up SSO first and are now adding SCIM separately.

Create the Enterprise Application (if not already done)

  1. Navigate to Azure Portal > Entra ID > Enterprise Applications.

  2. Click New Application > Create your own application.

  3. Name: Pirros SCIM (or similar).

  4. Select Integrate any other application you don't find in the gallery.

  5. Click Create.

Configure SAML SSO (if not already done)

  1. Go to Single sign-on > Select SAML.

  2. In Basic SAML Configuration, enter:

    • Identifier (Entity ID): Copy from the Pirros Settings page (SSO/SCIM tab)

    • Reply URL: Copy from the Pirros Settings page (SSO/SCIM tab)

Configure SCIM Provisioning

  1. Go to Provisioning > Get started > Provisioning (in the sidebar).

  2. Set Provisioning Mode to Automatic.

  3. In Admin Credentials, enter:

    • Tenant URL: Copy the SCIM Base/Reply URL from the Pirros Settings page

    • Secret Token: Copy the Bearer Token from the Pirros Settings page

  4. Click Test Connection to verify.

  5. Go to Attribute Mappings > Provision Microsoft Entra ID Users (not Groups):

    • Ensure Enabled is set to Yes

    • Enable Target Object Actions for Create, Update, and Delete

    • Verify these field mappings:

      • userNameuserPrincipalName

      • name.givenNamegivenName

      • name.familyNamesurname

      • emails[type eq "work"].valuemail

      • activeSwitch([IsSoftDeleted], , "True", "False", "False", "True")

  6. Click Save on the Attribute Mapping page.

  7. Navigate to Users and Groups and assign users. Provisioning runs on a schedule (up to 45 minutes). For immediate provisioning, use Provision on demand.


Okta

1. Create the Okta Application

  1. Navigate to Okta Admin Console > Applications > Create App Integration.

  2. Select SAML 2.0 > Next.

  3. Name: Pirros SSO (or similar).

2. Configure SAML Settings

  1. Single sign-on URL: Copy the Reply URL from the Pirros Settings page.

  2. Audience URI (SP Entity ID): Copy the Entity ID from the Pirros Settings page.

  3. Name ID format: EmailAddress.

  4. Application username: Email.

3. Configure SCIM Provisioning

  1. Go to the Provisioning tab > Configure API Integration.

  2. Check Enable API integration.

  3. Enter credentials:

    • Base URL: Copy the SCIM Base URL from the Pirros Settings page

    • API Token: Copy the Bearer Token from the Pirros Settings page

  4. Click Test API Credentials.

  5. Enable provisioning features:

    • Create Users

    • Update User Attributes

    • Deactivate Users


FAQ

Q: Does SCIM work without SSO?

A: No. SSO and JIT Provisioning must both be enabled in Pirros before SCIM can be configured.

Q: How long does it take for Azure to provision a new user?

A: Azure provisioning runs on a schedule and can take up to 45 minutes. Use Provision on demand in Azure for immediate provisioning.

Q: What happens when I deactivate a user in my identity provider?

A: SCIM automatically deactivates the user in Pirros during the next provisioning cycle. The user loses access but their data and history are preserved.

Q: Can I use both Azure and Okta at the same time?

A: No. Pirros supports one identity provider connection at a time.

Did this answer your question?