SCIM
SCIM (System for Cross-domain Identity Management) is a standard for provisioning and deprovisioning users and groups in an organization. IdPs (identity providers) like Okta, OneLogin, and Microsoft Entra ID support provisioning users through SCIM.
Sourcegraph supports SCIM 2.0 for provisioning and de-provisioning users.
SCIM integration requires your SCIM provider to have network connectivity to your Sourcegraph instance. For example, using Okta's SCIM service with a private Sourcegraph instance, you will need to implement an Okta privisioning agent within a network that can connect to both your Sourcegraph instance and Okta's cloud services before continuing this setup.
While our implementation of SCIM 2.0 is compliant with the specification, we’ve only tested it against two IdPs: Okta and Microsoft Entra ID. We can't guarantee it works with every IdP if the provider doesn't fully comply with the specification.
Currently, there is a known issue where Microsoft Entra ID validator will fail; however, this does not impact the ability to provision users.
How to use
To use SCIM, you must have an existing IdP configured as an auth provider on your Sourcegraph instance. For authenticating SCIM requests, we currently support Bearer token authentication. We have a guide for Okta setup below.
To configure:
-
Generate a random alphanumeric bearer token of maximum 255 characters. To do this in a terminal, run:
SHELLopenssl rand -base64 342 | tr -dc 'a-zA-Z0-9' | cut -c -255
(This command generates a random base64 string with more characters than required (342 characters) and then filters out non-alphanumeric characters. Finally, it trims the output to 255 characters. The reason we generate a longer string is to account for the fact that the base64 encoding has non-alphanumeric characters, which are removed by the tr command.)
-
Add the following line to your site configuration:
SHELL"scim.authToken": "{your token}"
-
If you use Microsoft Entra ID, add the following setting to your site config:
SHELL"scim.identityProvider": "Azure AD"
-
Set up your IdP to use our SCIM API. The API is at
SHELLhttps://sourcegraph.company.com/.api/scim/v2
Configuring SCIM for Okta
To set up user provisioning in Okta, you must first set up a new app integration of the "SAML 2.0" type, then configure it to use SCIM. Here are the steps to do this:
- Follow our SAML guide to set up a new app integration with SAML, then open the integration you just created.
- If you already have the integration, just open your existing app integration.
- Go to the "General" tab and click "Edit" in the "App Settings" section.
- Set "Provisioning" to "SCIM". This creates a new tab called "Provisioning".
- Go to the "Provisioning" tab, and click "Edit"
- Set "SCIM connector base URL" to
{yourSourcegraphUrl}/.api/scim/v2
- Set "Unique identifier field for users" to
userName
- Check the first three items in
Supported provisioning actions
: "Import New Users and Profile Updates", "Push New Users", and "Push Profile Updates". - Set "Authentication mode" to "HTTP Header"
- Under "HTTP Header", paste the same alphanumeric bearer token you used in your site config.
- Click "Test Connection Configuration" (first four items should be green—the user-related ones), then "Save".
- Switch to "Provisioning" → "To App" and click "Edit". Enable "Create Users", "Update User Attributes" and "Deactivate Users".
NOTE: You can also use our SAML and OpenID Connect integrations with Okta.
Features and limitations
User attributes
The User endpoint only synchronizes attributes needed to create a Sourcegraph account.
We sync the following attributes:
- preferred username
- name
- email addresses
REST methods
We support REST API calls for:
- Creating users (POST)
- Updating users (PATCH)
- Replacing users (PUT)
- Deleting users (DELETE)
- Listing users (GET)
- Getting users (GET)
Feature support
We support the following SCIM 2.0 features:
- ✅ Updating users (PATCH)
- ✅ Pagination for listing users
- ✅ Filtering for listing users
Limitations
- ❌ Bulk operations – need to add users one by one
- ❌ Sorting – when listing users
- ❌ Entity tags (ETags)
- ❌ Multi-tenancy – you can only have 1 SCIM client configured at a time.
- ❌ Tests with many IdPs – we’ve only validated the endpoint with Okta and Microsoft Entra ID.