SCIM provisioning flow
Create a SCIM connection
Create a SCIM connection for an organization to get the base URL and bearer token:Response:Provide the
base_url and bearer_token to the organization’s IT administrator to configure in their IdP.Configure the IdP
The organization’s IT administrator configures SCIM in their identity provider:
- Sets the SCIM base URL from step 1
- Adds the bearer token for authentication
- Maps user attributes (email, name, etc.)
- Optionally configures group provisioning
IdP syncs users and groups
The IdP sends SCIM requests to Stytch when:
- A user is provisioned (added to the application)
- User information is updated
- A user is deprovisioned (removed or deactivated)
- Groups are created, updated, or deleted
- Users are added to or removed from groups
Handle webhooks (optional)
Stytch triggers webhooks for all SCIM events. Subscribe to these to keep your internal systems in sync:
scim.member.create- Member provisioned from IdPscim.member.update- Member information updatedscim.member.delete- Member deprovisionedscim.idp_group.create- IdP group createdscim.idp_group.update- IdP group updatedscim.idp_group.delete- IdP group deletedscim.idp_group.member_add- Member added to groupscim.idp_group.member_delete- Member removed from group
SCIM and RBAC
Map IdP groups to Stytch roles using the Update Connection endpoint. Members automatically receive roles based on their group membership, and role changes propagate to active sessions within 5 minutes through JWT refresh. Learn more in the SCIM guide.Learn more
SCIM guide
Comprehensive SCIM documentation
Admin Portal
Pre-built UI for SCIM management