Update SCIM Connection

PUThttps://test.stytch.com/v1/b2b/scim/{organization_id}/connections/{connection_id}

Update a SCIM Connection.

Our RBAC implementation offers out-of-the-box handling of authorization checks for this endpoint. If you pass in a header containing a session_token or a session_jwt for an unexpired Member Session, we will check that the Member Session has permission to perform the update action on the stytch.scim Resource.

If the Member Session does not contain a Role that satisfies the requested permission, or if the Member's Organization does not match the organization_id passed in the request, a 403 error will be thrown. Otherwise, the request will proceed as normal.

To learn more about our RBAC implementation, see our RBAC guide.


Path parameters


organization_id*string

connection_id*string

Body parameters


idpstring

display_namestring

Header parameters


X-Stytch-Member-Sessionstring

X-Stytch-Member-SessionJWTstring

Response fields


status_codeint

request_idstring

connectionobject
curl --request PUT \
  --url https://test.stytch.com/v1/b2b/scim/organization-test-07971b06-ac8b-4cdb-9c15-63b17e653931/connections/saml-connection-test-51861cbc-d3b9-428b-9761-227f5fb12be9 \
  -u 'PROJECT_ID:SECRET' \
  -H 'Content-Type: application/json' \
  -H "X-Stytch-Member-Session: mZAYn5aLEqKUlZ_Ad9U_fWr38GaAQ1oFAhT8ds245v7Q" \
  -d '{
    "display_name": "Example SCIM connection"
  }'

RESPONSE

200
{
	"request_id": "request-id-test-b05c992f-ebdc-489d-a754-c7e70ba13141",
	"status_code": 200,
    "connection": {
        "organization_id": "organization-test-07971b06-ac8b-4cdb-9c15-63b17e653931"
        "connection_id": "scim-connection-test-cdd5415a-c470-42be-8369-5c90cf7762dc"
        "status": "active",
        "display_name": "My SCIM Connection"
        "idp": "okta"
        "base_url": "https://test.stytch.com/v1/b2b/scim/scim-connection-test-cdd5415a-c470-42be-8369-5c90cf7762dc"
        "bearer_token_last_four": "sdko"
        "bearer_token_expires_at": "2029-03-20T21:28:28Z"
    },
}