Overview
SCIM (System for Cross-domain Identity Management) enables automatic user and group synchronization between your identity provider and Wolfia. This provides:- Automatic user provisioning: New users in your IdP automatically get Wolfia access
- Real-time updates: Changes to users in your IdP sync immediately to Wolfia
- Automatic deprovisioning: Removing users from your IdP removes their Wolfia access
- Role assignment: Map your IdP groups to Wolfia roles for automatic permission management
- Reduced admin overhead: No manual user management required
How SCIM works
SCIM creates a continuous sync between your identity provider and Wolfia:- Create: When you assign a user to Wolfia in your IdP, they’re automatically created in Wolfia
- Update: Changes to user details (name, email, group membership) sync automatically
- Delete: Removing a user from Wolfia in your IdP deactivates their account
- Groups: Your IdP groups sync to Wolfia and control user roles
SCIM requires SSO to be configured first. If you haven’t set up SSO yet, see our SSO Setup Guide.
Supported identity providers
Wolfia supports SCIM with these providers:- Okta (SCIM 2.0)
- Azure Active Directory / Microsoft Entra ID (SCIM 2.0)
- Google Workspace (Google Directory API)
- OneLogin (SCIM 2.0)
- JumpCloud (SCIM 2.0)
- Authentik (SCIM 2.0)
- Any SCIM 2.0 compatible provider
Prerequisites
Before setting up SCIM:- SSO must be configured - Complete SSO setup first
- Admin access to your IdP - You need permissions to configure SCIM
- Admin access to Wolfia - Must be an Administrator role
- Groups configured in your IdP (if using role assignment)
Setup process
1
Request SCIM setup
Contact your Wolfia account representative or email support@wolfia.com to:
- Enable SCIM/Directory Sync for your organization
- Receive your unique SCIM configuration portal link
- Ensure SSO is properly configured
2
Access the configuration portal
Click the Directory Sync setup link provided by Wolfia. You’ll be directed to a guided configuration portal that walks you through each step specific to your identity provider.
3
Select your identity provider
In the configuration portal:
- Choose your identity provider from the list
- The portal displays provider-specific instructions
- Note the SCIM connection details you’ll need
- Okta: SCIM 2.0 endpoint and bearer token
- Azure AD: Automatic provisioning setup
- Google Workspace: Directory API configuration
- Authentik: SCIM endpoint and token configuration
4
Configure SCIM in your identity provider
The configuration portal provides specific setup details for your IdP:
For Okta:
- In Okta Admin Console, go to Applications → Your Wolfia App
- Click the “Provisioning” tab
- Click “Configure API Integration”
- Enter the SCIM Base URL and API Token from the portal
- Test the connection
- Enable provisioning features: “Create Users”, “Update User Attributes”, “Deactivate Users”
- Configure attribute mappings (email, firstName, lastName)
For Azure AD (Entra ID):
- In Azure Portal, go to Enterprise Applications → Wolfia
- Click “Provisioning” in the left menu
- Set Provisioning Mode to “Automatic”
- Enter the Tenant URL and Secret Token from the portal
- Test the connection
- Configure attribute mappings
- Set Provisioning Status to “On”
For Google Workspace:
- The configuration portal will guide you through OAuth authorization
- Grant Wolfia access to your Google Workspace directory
- Select which organizational units to sync
- Configure user and group sync settings
For Authentik:
- In Authentik Admin Interface, create a new Provider
- Choose “SCIM Provider” as the type
- Enter the SCIM endpoint URL from the portal
- Configure the bearer token
- Set up property mappings for user attributes
- Create an Application and bind the provider
For JumpCloud:
- In JumpCloud Admin Portal, go to Applications
- Click ”+ Add Application” and select “Custom Application”
- Choose “SAML with SCIM User Provisioning”
- Enter the SCIM Base URL and API Token from the portal
- Test the connection to verify connectivity
- Configure attribute mappings:
- Email: Required - Maps to user’s email address
- First Name: Maps to givenName
- Last Name: Maps to surname
- Role: Critical for automatic role assignment (see below)
- Configure the role attribute:
- In Attribute Mapping section, add a custom attribute named “role”
- Set the source to a JumpCloud user attribute or group membership
- Value must be one of: “ADMIN”, “EXPERT”, or “USER”
- Example: Map
customAttributes.wolfiaRoleto “role” in SCIM payload
- Enable provisioning features:
- Create Users: Automatically create users when assigned
- Update User Attributes: Sync attribute changes
- Deactivate Users: Remove access when unassigned
- Push Groups: Sync group memberships (required for role assignment)
- Assign users or groups to the Wolfia application
- Option 1 - User Attribute: Set a custom user attribute (e.g.,
wolfiaRole) in JumpCloud user profiles with values “ADMIN”, “EXPERT”, or “USER” - Option 2 - Group-Based: Use JumpCloud’s group membership to determine roles, then map those groups to the role attribute in the SCIM configuration
- The role value flows through the SCIM payload and Wolfia automatically assigns permissions based on this value
- Users without a role attribute default to “Standard User” role
5
Configure role assignment (Optional but Recommended)
Map your IdP groups to Wolfia roles for automatic permission management:Available Wolfia roles:
- Administrator: Full access to all features, settings, and user management
- Expert: Advanced access to create content, manage integrations, and handle questionnaires
- Standard User: View and interact with shared content, participate in questionnaires
- After connecting your directory, you’ll see a “Role Assignment” section
- For each group you want to map:
- Select a group from your identity provider
- Choose the corresponding Wolfia role
- Review your role mappings
Users not in any mapped group automatically receive the Standard User role. You only need to map groups that require elevated permissions.
6
Configure sync settings
In your identity provider, configure what to sync:User sync:
- Create users automatically when assigned to Wolfia
- Update user attributes (name, email) when changed
- Deactivate users when unassigned from Wolfia
- Sync group memberships to Wolfia
- Update group assignments in real-time
- Map groups to Wolfia roles (configured in the portal)
Be careful with “Delete users” if your IdP supports it. We recommend using “Deactivate” instead to preserve user history and data.
7
Assign users and groups
In your identity provider:
- Assign users to the Wolfia application
- Assign groups to the Wolfia application (if using role assignment)
- Users will be automatically created in Wolfia within minutes
- Go to Applications → Wolfia → Assignments
- Click “Assign” and choose “Assign to People” or “Assign to Groups”
- Go to Enterprise Applications → Wolfia → Users and groups
- Click ”+ Add user/group” and select users or groups
- Users are automatically synced based on organizational unit selection
- Assign users or groups to the Wolfia application
- Ensure users have the necessary permissions
8
Complete setup and test
- Click “Finish Setup” in the configuration portal
- The system validates the SCIM connection
- Initial user sync begins automatically
- Assign a test user to Wolfia in your IdP
- Wait 2-5 minutes for sync to complete
- Check the Wolfia Admin Panel → Users section
- Verify the user appears with correct role
- Test login with the user’s SSO credentials
User experience with SCIM
For new users
When a user is assigned to Wolfia in your IdP:- Automatic account creation: User account created in Wolfia within 2-5 minutes
- Role assignment: User receives role based on group membership (if configured)
- Welcome email: User receives invitation to access Wolfia
- SSO login: User can immediately log in via SSO
For existing users
When you enable SCIM for an organization with existing users:- Account matching: SCIM matches users by email address
- No duplicate accounts: Existing users are updated, not recreated
- Role updates: If role assignment is enabled, existing user roles are updated
- Seamless transition: Users experience no interruption
For user changes
When a user’s details change in your IdP:| Change | SCIM Action | Result in Wolfia |
|---|---|---|
| Name updated | User update | Name updated immediately |
| Email changed | User update | Email and login updated |
| Group added | Group sync | Role updated (if mapped) |
| Group removed | Group sync | Role downgraded (if applicable) |
| User unassigned | User deactivation | Account deactivated, loses access |
| User reassigned | User reactivation | Account reactivated, access restored |
Role assignment in detail
How role assignment works
When you map IdP groups to Wolfia roles:- Initial assignment: When a user is first synced, Wolfia checks their group memberships
- Role determination: User receives the highest privilege role from their groups
- Automatic updates: When group membership changes, role updates within minutes
- Default role: Users without any group mapping receive Standard User role
Role hierarchy and permissions
| Role | Permissions | Use Cases |
|---|---|---|
| Administrator | • Full access to all features • Manage organization settings • Manage users and permissions • Configure integrations • Manage trust portals • Access internal admin tools | IT Admins, Engineering Leads, Security Administrators |
| Expert | • Create and manage content • Configure integrations • Manage questionnaires and policies • Collaborate across teams • Cannot modify org settings or manage users | Security Team, Compliance Team, Product Managers, Technical Writers |
| Standard User | • View and interact with shared content • Participate in questionnaires • Access trust portals • Collaborate with team members • Cannot create integrations or modify content | All Employees, Contractors, External Collaborators |
Example role assignment scenarios
Scenario 1: IT Administrator- Member of “IT Administrators” group
- Mapped to Administrator role
- Has full access to all Wolfia features
- Member of “Security Team” and “All Employees” groups
- “Security Team” mapped to Expert role
- Receives Expert role (highest available)
- Member of “All Employees” group only
- “All Employees” not mapped to any role
- Receives Standard User role (default)
- Member of both “Security Team” (Expert) and “IT Admins” (Administrator)
- Receives Administrator role (highest privilege)
Single role limitation: Users can only have one role at a time. If a user is in multiple groups with different role mappings, they receive the highest privilege role.
Reconciliation and sync frequency
SCIM keeps Wolfia synchronized with your IdP through:- Real-time sync: Changes pushed immediately via webhooks (typically 1-5 minutes)
- Daily reconciliation: Full sync runs daily to catch any missed updates
- Manual sync: Contact Wolfia support to trigger immediate full reconciliation
What syncs in real-time:
- User creation, updates, and deactivation
- Group membership changes
- Role updates (via group changes)
What syncs during reconciliation:
- Verification of all users and groups
- Correction of any sync discrepancies
- Role verification and updates
Monitoring and troubleshooting
Check sync status
-
In your IdP:
- Check provisioning logs for sync events
- Look for any error messages or warnings
- Verify users are assigned to Wolfia app
-
In Wolfia Admin Panel:
- Go to Settings → Users
- Verify users appear with correct roles
- Check last login and account status
-
In the configuration portal:
- View sync event logs
- Check connection health status
- Review recent sync operations
Common issues and solutions
User not syncing to Wolfia
User not syncing to Wolfia
Common causes:
- User not assigned to Wolfia app in IdP
- Email attribute mapping incorrect
- SCIM connection credentials expired
- Verify user is assigned to Wolfia in your IdP
- Check attribute mappings (email must be included)
- Re-validate SCIM credentials in the configuration portal
- Review IdP provisioning logs for errors
- Contact Wolfia support with error details
User has wrong role
User has wrong role
Common causes:
- Group membership not synced
- Role mapping incorrect in configuration portal
- User in multiple groups with different mappings
- Verify user’s group memberships in IdP
- Check role mappings in the configuration portal
- Remove user from groups they shouldn’t be in
- Wait 5-10 minutes for sync to complete
- Trigger manual reconciliation if needed
Sync stopped working
Sync stopped working
Common causes:
- SCIM credentials expired or rotated
- Network/firewall blocking requests
- IdP configuration changed
- Check SCIM connection status in configuration portal
- Re-validate credentials if expired
- Review recent IdP configuration changes
- Check IdP provisioning logs for errors
- Contact Wolfia support for investigation
Group changes not reflecting
Group changes not reflecting
Common causes:
- Group sync not enabled
- Group not assigned to Wolfia app
- Role mapping not configured for group
- Ensure group sync is enabled in your IdP
- Verify group is assigned to Wolfia application
- Check role mapping exists for the group
- Wait 5-10 minutes for sync
- Manually trigger reconciliation
Security considerations
Best practices
- Least privilege: Only map groups that need elevated permissions to Admin/Expert roles
- Regular review: Periodically review role mappings and group memberships
- Audit logging: Monitor sync logs for unexpected changes
- Test before rollout: Test with a small group before enabling for entire organization
Data sync
SCIM syncs the following data:- User identifiers: Email, first name, last name, external ID
- Group memberships: Only groups mapped to Wolfia roles
- Status: Active or deactivated
Wolfia does not store your IdP passwords or authentication credentials. All authentication goes through your IdP via SSO.
Disabling SCIM
If you need to disable SCIM:- In your IdP: Turn off provisioning or unassign users
- Contact Wolfia support: Request SCIM disconnection
- User impact: Existing users remain active but won’t auto-sync
After disabling SCIM, you must manually manage user accounts and roles through the Wolfia Admin Panel.
Need help?
SCIM setup can be complex. Our team is here to help:- Email: support@wolfia.com
- Include: Organization name, IdP type, and sync logs/errors
- Response time: We typically respond within 1 business day
- Setup assistance: We can join a call to help configure SCIM
Related guides
- SSO Setup - Configure Single Sign-On (required before SCIM)
- Setting up Wolfia - General admin setup guide
- API User Invites - Programmatic user management alternative

