Truthlocks supports SCIM 2.0 for automated user provisioning and group management. Connect your identity provider (Okta, Azure AD, OneLogin, etc.) to automatically create, update, and deactivate users in your Truthlocks tenant.Documentation Index
Fetch the complete documentation index at: https://docs.truthlocks.com/llms.txt
Use this file to discover all available pages before exploring further.
SCIM provisioning is available on the Business plan and above.
How it works
Generate a SCIM token
In the console, go to Settings > SCIM and generate a bearer token.
This token authenticates your IdP’s SCIM requests.
Configure your IdP
In your identity provider, set the SCIM base URL to
https://api.truthlocks.com/scim/v2 and paste the bearer token.SCIM base URL
Authorization header:
Supported operations
Users
| Operation | Method | Path | Description |
|---|---|---|---|
| List | GET | /scim/v2/Users | List users with optional filter |
| Create | POST | /scim/v2/Users | Provision a new user |
| Get | GET | /scim/v2/Users/{id} | Retrieve a user by SCIM ID |
| Replace | PUT | /scim/v2/Users/{id} | Full user replacement |
| Patch | PATCH | /scim/v2/Users/{id} | Partial update (e.g., deactivate) |
| Delete | DELETE | /scim/v2/Users/{id} | Suspend the user |
Groups
| Operation | Method | Path | Description |
|---|---|---|---|
| List | GET | /scim/v2/Groups | List groups |
| Create | POST | /scim/v2/Groups | Create a group mapping |
| Get | GET | /scim/v2/Groups/{id} | Retrieve a group by SCIM ID |
| Replace | PUT | /scim/v2/Groups/{id} | Replace group (re-maps role bindings) |
| Patch | PATCH | /scim/v2/Groups/{id} | Add or remove members |
| Delete | DELETE | /scim/v2/Groups/{id} | Delete group mapping |
Discovery
| Method | Path | Description |
|---|---|---|
| GET | /scim/v2/ServiceProviderConfig | Supported capabilities |
| GET | /scim/v2/Schemas | Resource schemas |
| GET | /scim/v2/ResourceTypes | Available resource types |
Creating a user
Deactivating a user
IdPs like Okta and Azure AD send a PATCH request to deactivate users:Managing SCIM tokens
Generate and manage tokens through the management API:Activity log
All SCIM operations are recorded in an activity log. View recent provisioning events:USER_CREATED, USER_DEACTIVATED, USER_PATCHED, GROUP_CREATED, GROUP_UPDATED, and GROUP_DELETED.
Seat enforcement
User creation respects your plan’s seat limit. If the limit would be exceeded, the SCIM endpoint returns HTTP402 and the user is not created. Upgrade your plan or remove inactive users to free seats.
Filtering
The SCIMfilter query parameter lets your identity provider narrow list responses to specific users or groups. Truthlocks supports filtering on specific SCIM attributes using the operators below.
Supported filter attributes
| Attribute | Resource | Description |
|---|---|---|
userName | Users | The user’s login identifier (usually an email address) |
displayName | Users, Groups | The user’s or group’s display name |
externalId | Users, Groups | The unique identifier assigned by your identity provider |
active | Users | Whether the user account is active (true / false) |
Supported operators
| Operator | Meaning | Example |
|---|---|---|
eq | Equals | userName eq "jane@example.com" |
ne | Not equals | active ne false |
co | Contains | userName co "example.com" |
sw | Starts with | userName sw "jane" |
ew | Ends with | userName ew "@example.com" |
and / or for complex queries:
Filtered results are capped at 200 items per response. If your IdP syncs more than 200 users or groups, it should paginate using the
startIndex and count parameters alongside the filter.Common IdP filter patterns
Most identity providers send filters automatically during sync. Here are the patterns that Truthlocks handles:| IdP | Typical filter sent |
|---|---|
| Okta | userName eq "user@example.com" |
| Azure AD | userName eq "user@example.com", displayName co "Smith", or externalId eq "id" |
| OneLogin | userName sw "user" or externalId eq "id" |
Supported capabilities
| Capability | Supported |
|---|---|
| Patch | Yes |
| Bulk | No |
| Filter | Yes — eq, ne, co, sw, ew on userName, displayName, externalId, active with and / or (max 200 results) |
| Sort | No |
| Change password | No |
| ETag | No |
Related
- SAML SSO — Authenticate users through your IdP.
- RBAC & permissions — Roles assigned to provisioned users.
- Audit logs — Track all access and provisioning events.

