Skip to content
English
  • There are no suggestions because the search field is empty.

SCIM in IdeaScale

SCIM functionality for in IdeaScale SSO Workspaces

Path: Manage Workspace >> Security >> Authentication >> Single Sign On >> SCIM

SCIM, or System for Cross-domain Identity Management, automates the sharing of user identity data across services. IdeaScale has developed a feature to enable SCIM for its SSO using clients.

TABLE OF CONTENTS

SCIM Functionality
IdeaScale Settings
SCIM Provisioning in IdP Application


SCIM Functionality

SCIM operates on a client-server model where SCIM Server like IdeaScale acquires user data from SCIM Client - Identity Provider (IdP) using REST API. It helps lessen the workload for administrators by eliminating the need to manually create and update user accounts and groups in IdeaScale Workspace. It utilizes authentication methods, such as OAuth and basic authentication, to ensure secure communication between the IdP and IdeaScale.

It can perform CRUD operations as follows:

Create: The IdP creates a new user account within the IdeaScale using SCIM.

Read: The IdP retrieves existing user information from IdeaScale.

Update: The IdP updates user details (e.g., email address, password) within IdeaScale.

Delete: The IdP can deactivate/delete a user account within IdeaScale when their employment ends or access needs are revoked.


IdeaScale Settings

SCIM is only available for SSO enabled workspaces. There needs to be an active SSO setup in the Workspace to use it.

The workspace admin will be able to see the setting enabled under Manage Workspace >> Security >> Authentication >> Single Sign On >> SCIM.

Screenshot 2026-04-07 at 11.27.39 AM

Copy the SCIM token to paste in the configuration settings of IdP application  like Azure portal using the Copy icon.

Workspace admin can generate a new SCIM token using the Reload/Regenerate icon.

Note: Workspace admin cannot enable or disable SCIM setting for a workspace. Please contact your Customer Success Manager to do it.


SCIM Provisioning in IdP Application

The workspace admin need to have admin access in their IdP application to setup SCIM for IdeaScale.

Following are the steps to setup SCIM in Azure portal:

1. Create a new Provisioning configuration for IdeaScale SSO



2. Fill the following details to configure and then test the connection:

a. Select authentication method - Select desired authentication method.
b. Target URL - Enter the IdeaScale workspace URL followed by scim/v2 Example: https://ides.ideascale.com/scim/v2
c. Secret token - Paste the SCIM token generated in IdeaScale.

3. Once the connection is established, add the created or updated  users or groups to be pushed to IdeaScale.


Note: Visibility of the pushed changes will be reflected in IdeaScale depending on the IdP Client policy (Real time, 40 mins or per day)

Last Updated: April 9, 2026