SCIM provisioning is available on the Business plan and above.
How it works
Generate a SCIM token
In the console, go to Settings > SCIM and generate a bearer token.
This token authenticates your IdP’s SCIM requests.
Configure your IdP
In your identity provider, set the SCIM base URL to
https://api.truthlocks.com/scim/v2 and paste the bearer token.SCIM base URL
Authorization header:
Supported operations
Users
| Operation | Method | Path | Description |
|---|---|---|---|
| List | GET | /scim/v2/Users | List users with optional filter |
| Create | POST | /scim/v2/Users | Provision a new user |
| Get | GET | /scim/v2/Users/{id} | Retrieve a user by SCIM ID |
| Replace | PUT | /scim/v2/Users/{id} | Full user replacement |
| Patch | PATCH | /scim/v2/Users/{id} | Partial update (e.g., deactivate) |
| Delete | DELETE | /scim/v2/Users/{id} | Suspend the user |
Groups
| Operation | Method | Path | Description |
|---|---|---|---|
| List | GET | /scim/v2/Groups | List groups |
| Create | POST | /scim/v2/Groups | Create a group mapping |
| Get | GET | /scim/v2/Groups/{id} | Retrieve a group by SCIM ID |
| Replace | PUT | /scim/v2/Groups/{id} | Replace group (re-maps role bindings) |
| Patch | PATCH | /scim/v2/Groups/{id} | Add or remove members |
| Delete | DELETE | /scim/v2/Groups/{id} | Delete group mapping |
Discovery
| Method | Path | Description |
|---|---|---|
| GET | /scim/v2/ServiceProviderConfig | Supported capabilities |
| GET | /scim/v2/Schemas | Resource schemas |
| GET | /scim/v2/ResourceTypes | Available resource types |
Creating a user
Deactivating a user
IdPs like Okta and Azure AD send a PATCH request to deactivate users:Managing SCIM tokens
Generate and manage tokens through the management API:Activity log
All SCIM operations are recorded in an activity log. View recent provisioning events:USER_CREATED, USER_DEACTIVATED, USER_PATCHED, GROUP_CREATED, GROUP_UPDATED, and GROUP_DELETED.
Seat enforcement
User creation respects your plan’s seat limit. If the limit would be exceeded, the SCIM endpoint returns HTTP402 and the user is not created. Upgrade your plan or remove inactive users to free seats.
Supported capabilities
| Capability | Supported |
|---|---|
| Patch | Yes |
| Bulk | No |
| Filter | Yes (max 200 results) |
| Sort | No |
| Change password | No |
| ETag | No |
Related
- SAML SSO — Authenticate users through your IdP.
- RBAC & permissions — Roles assigned to provisioned users.
- Audit logs — Track all access and provisioning events.
