SCIM Provisioning
Available on Business and Enterprise plans.
Prerequisites
- Business or Enterprise plan
- SAML SSO configured (see SAML 2.0 SSO)
- IdP admin access to configure SCIM
SCIM Endpoints
| Parameter | Value |
|---|---|
| SCIM Base URL | https://portal.mergeguide.ai/scim/v2 |
| Authentication | Bearer token |
| Supported version | SCIM 2.0 (RFC 7644) |
Generate a SCIM Bearer Token
- Go to Settings > Security > SCIM Provisioning
- Click Generate Token
- Copy the token immediately — it is shown only once
- Store it securely (1Password, Vault, or your IdP’s secret store)
Attribute Mapping
MergeGuide maps standard SCIM attributes as follows:| SCIM Attribute | MergeGuide Field | Required |
|---|---|---|
userName | Email address | Yes |
name.givenName | First name | No |
name.familyName | Last name | No |
emails[primary=true].value | Email address | Yes |
active | Account active/suspended | Yes |
groups | MergeGuide roles | No |
Group-to-Role Mapping
Map IdP groups to MergeGuide roles:| IdP Group Name | MergeGuide Role |
|---|---|
mergeguide-admins | Admin |
mergeguide-developers | Developer |
mergeguide-viewers | Viewer |
IdP-Specific Setup
Okta
Add the SCIM application
In Okta, open the MergeGuide SAML app (already configured). Go to the Provisioning tab and click Configure API Integration.
Enter SCIM credentials
- SCIM connector base URL:
https://portal.mergeguide.ai/scim/v2 - Unique identifier field:
email - Authentication Mode: HTTP Header
- Authorization:
Bearer <your-token>
Enable provisioning actions
Under To App, enable:
- Push New Users
- Push Profile Updates
- Push Groups (if using group-to-role mapping)
- Deactivate Users
Azure Active Directory (Entra ID)
Open provisioning settings
In the Azure portal, go to Enterprise Applications > MergeGuide > Provisioning.
Enter admin credentials
- Tenant URL:
https://portal.mergeguide.ai/scim/v2 - Secret Token:
<your-bearer-token>
Configure attribute mappings
Review the default attribute mappings. MergeGuide uses
userName for email. Verify userPrincipalName maps to userName.OneLogin
Enable SCIM in the MergeGuide app
Open the MergeGuide connector in OneLogin. Go to Configuration and enter:
- SCIM Base URL:
https://portal.mergeguide.ai/scim/v2 - SCIM Bearer Token:
<your-bearer-token>
Example SCIM API Calls
These examples use the SCIM API directly — typically your IdP makes these calls, but they are useful for testing and troubleshooting.List Users
Create a User
Deactivate a User
List Groups
Deprovisioning Behavior
When your IdP deactivates a user via SCIM:- The user’s MergeGuide session is terminated within 5 minutes
- The user cannot sign in via SSO or email/password
- The user’s data (evaluations, policies created) is retained
- The seat is freed and available for reassignment
Troubleshooting
Provisioning Errors in Your IdP
Check the provisioning logs in your IdP first — Okta and Azure both provide per-user provisioning status with error details. Common causes:- 401 Unauthorized — Token expired or incorrect. Regenerate and update the IdP.
- 409 Conflict — User already exists with that email. MergeGuide will update the existing record.
- 400 Bad Request — Required attribute missing. Verify
userNameandemailsare mapped.
Users Not Deprovisioned
Verify the IdP is sendingactive: false on deactivation. Some IdPs require explicit configuration to push deactivation events (Okta: Deactivate Users must be enabled under To App).